You are on page 1of 13

SYNOPSIS PRESENTATION

PRESENTED BY:-
SHVETA AND SUCHITRA YADAV
PRESENTED TO:-
PROF. AJAY KR. SRIVASTAVA
PRESENTATION FLOW

 INTRODUCTION
 PROBLEM DEFINITION
 INNOVATION
 PROPOSED METHODOLOGY
 MODULE DESCRYPTION
 REQUIREMENT ANALYSIS
 APPLICATION
INTRODUCTION
 Phishing is new word produced from ‘fishing’.
 Phishing is the fraudulent attempt to obtain sensitive information or data, such as user
name, password and credit card details.
 In phishing attacker allure users to visit a fake website by sending them faked emails or
text messages and get victim’s personal information such as user name , password,
national security id etc.
 These sensitive information is even used for identity theft attacks e.g. transfer money
from victim’s bank account.

.
PROBLEM DEFINITION

 Phishing websites are duplicate web pages created to mimic real websites in order to deceive
people to get their personal information.
 Due to the adaptability of the phisher tactics with little cost, detecting and identifying
phishing websites is a complex and dynamic problem.
 Phishing is typically carried out by email spoofing, instant messaging and text messaging.
These messages or emails direct users to the fraudulent websites and often deirects users to
enter personal information.
 INNOVATION IN THE PROJECT
PROPOSED METHODOLOGY
 URL Dataset:-The data of URLs is obtained from Phishtank website, where Phishtank is a anti-
phishing website.

 Pre-Processing of data: The data is pre processed to help extract feature values from the URL. It
converts the data into structured format.

 Feature extraction: It extracts the feature value through the predefined URL-based feature.

 Training: The training data is used to make sure that machine recognizes the URL pattern in the data.
The cross-validation data is used to ensure better accuracy and efficiency of the algorithm used to train
the machine.

 Testing: The test data is used to see how well the machine can predict new answers based on its training.

 Classification process: Classification process is the final step. In this step, the classifier detects whether
the given URL is legitimate URL or a phishing URL on the basis of traning data.
MODULE DESCRIPTION
 REGISTRATION:- The user has to enter his user name , e-mail id and password in order to register
him . In order to access further features the visitor has to register himself.

 LOG IN:- After successful registration the user/admin can enter their credentials to log in into the
system.

 ADD TO BLOCKLUST:- This module is only available to the admin Here, the admin adds the
malicious websites to the blocklist . If the site is blacklisted it prevents the user from accessing it.

 CHECK WEBSITE:- Here the user enters URL to check whether it is legitimate or not. If the site is
legitimate it allows the user to access it otherwise a message is displayed to tell the user that the site is
blacklisted. i.e. it is a phishing website.

 FEEDBACK:- Here the user can give his opinion on the working of the website.

 CHANGE PASSWORD:- The admin may change his password for security purpose by entering the old
and new password.
REQUIREMET ANALYSIS

 SOFTWARE REQUIREMENT
 WINDOWS 7 OR HIGHER
 VISUAL STUDIO 2010
 SQL SERVER 2008
 HARDWARE REQUIREMENTS
 PROCESS – CORE I3 OR ABOVE
 HARD DISK SPACE AVAILABLE – 10 GB
 MEMORY – 4 GB RAM
 INTERNET CONNECTION
 TECHNOLOGY AND LANGUAGES USED
 PYTHON
 MACHINE LEARNING
APPLICATION

 This website have biggest application in the pandemic situations like Covid -19.
 As in this covid-19 many fake website or phishing websites are available in the current scenario
which are being used to steal the necessary information of users.
 These websites are being used on the name of donation and providing test kits. Hackers have
created the mimic websites of Indian government websites.
.

 It can be useful for many e-commerce enterprises.


 This system will be useful for many users who purchase online products.
 It will also prevent the users from visiting malicious websites which can cause damage to their
system.


LIMITATIONS

 The limitations of this system is that it fails without internet connection.


.

You might also like