CFP last date
22 April 2024
Reseach Article

A Survey on Phishing Attacks

by Krutika Rani Sahu, Jigyasu Dubey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 10
Year of Publication: 2014
Authors: Krutika Rani Sahu, Jigyasu Dubey
10.5120/15392-4007

Krutika Rani Sahu, Jigyasu Dubey . A Survey on Phishing Attacks. International Journal of Computer Applications. 88, 10 ( February 2014), 42-45. DOI=10.5120/15392-4007

@article{ 10.5120/15392-4007,
author = { Krutika Rani Sahu, Jigyasu Dubey },
title = { A Survey on Phishing Attacks },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 10 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number10/15392-4007/ },
doi = { 10.5120/15392-4007 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:18.527403+05:30
%A Krutika Rani Sahu
%A Jigyasu Dubey
%T A Survey on Phishing Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 10
%P 42-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last few years a large number of internet users are increasing additionally different companies, banks and service providers are providing services online. So various sensitive and financial data are becomes online now in these days. This aspect of internet users are an evolution for us but the dark side of this advantage is too hard to accept, because of hackers and intruders are working between end clients and service providers. A secure and efficient technique is required to detect and prevent the attacks over the network transaction. In this paper we make a survey about various attacks and their problems and establish a problem statement for finding the optimum solution for the problem arises. In addition of that here we propose a system architecture for future simulation of security in internet based security.

References
  1. Theodore S. Rappaport, Wireless Communications: Principals and Practice, 2nd ed. , Pearson Education (Singapore) Pte. Ltd. , India, 2002.
  2. C. Berrou, A. Glavieux and P. Thitimajshima, Near Shannon limit error-correcting coding and decoding: turbo code, Inter. Conf Commun. , pp. 1064-1070. 1993.
  3. D. C. MacKay, Near Shannon limit performance of low density parity check Codes, Electronics Letters, Vol. 32, pp. 1645-1646, Aug. 1966.
  4. C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. , Vol. 27, pp. 379-423 (Part one), pp. 623-656 (Part two), Oct.
  5. Upena Dalal, Wireless Communication, Oxford University Press, India, 2009.
  6. Branka Vucetic and Jinhong Yuan, Space-Time Coding, John Wiley & Sons, 2003.
  7. Kai-Ting Shr, Hong-Du Chen, and Yuan-Hao Huang, A Low-Complexity Viterbi Decoder For Space-Time Trellis Codes, IEEE Transactions on Circuits and Systems-I, Vol. 57, No. 4, pp. 873-885, April 2010.
  8. N. Kumaratharan, S. Jayapriya and P. Dananjayan, STTC based STBC Site Diversity Technique for MC-CDMA system, IEEE Second International Conference on Computing, Communication and networking Technologies, pp. 1-5, 2010.
  9. Pierre Viland, Gheorghe Zaharia and Jean-Francois Helard, Improved Balanced 2n-PSK STTCs for Any Number of Transmit Antennas from a New and General Design Method, IEEE Conference on Vehicular Technology, pp. 1-5, 2009.
  10. Kabir Ashraf, Different STTC over Rayleigh Fading Channels, IEEE Conference, Dec. 2009.
  11. Pierre Viland, Gheorghe Zaharia and Jean-Francois Helard, Coset Partitioning for the 4- PSK Space-Time Trellis Codes, IEEE Conference on "Signals, Circuits and Systems, 2009.
  12. Thi Minh Hien Ngo, Gheorghe Zaharia, Stephane Bougeard and Jean Francois Helard 4-PSK Balanced STTC with two transmit antennas, IEEE Conference, 2007.
  13. Murat Uysal, and Costas N. Georghiades, On the Error Performance Analysis of Space-Time Trellis Codes, IEEE Transactions on Wireless Communications, Vol. 3, No. 4, pp. 1118-1123, July 2004.
  14. J. N. Pillai and S. H. Mneney, Adaptively Weighted Space-Time Trellis Codes, Southern African Telecommunication Networks and Application Conference, Sep. 2004.
  15. Helmut Bolcskei and Arogyaswami J. Paulraj, Performance of space-time codes in the presence of spatial fading Correlation, IEEE Conference, Vol. 1, pp. 687-693, 2000.
  16. Murat Uysal and Costas N. Georghiades, Error Performance Analysis of Space-Time Codes over Rayleigh Fading Channels, Journal of Communications and Networks, Vol. 2, No. 4, pp. 351-356, Dec. 2000.
  17. M. K. Simon and M. -S. Alouini, Digital Communication over Fading Channels: A Unified Approach to Perform Analysis, John Wiley & Sons, 2000.
  18. T. S. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall, 1996.
  19. A. F. Naguib and R. Calderbank, Space-time coding and signal processing for high data rate wireless communications, IEEE Signal Processing Magazine, Vol. 17, No. 3, pp. 76-92, Mar. 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Internet based security phishing detection system architecture