CFP last date
22 April 2024
Reseach Article

A new architecture to perform Phishing via Trojan Horse

Published on None 2011 by C.Mounica, S.Benson Edwin Raj
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 3
None 2011
Authors: C.Mounica, S.Benson Edwin Raj
2c33311a-24e5-4211-a3a3-74d0371197bc

C.Mounica, S.Benson Edwin Raj . A new architecture to perform Phishing via Trojan Horse. Computational Science - New Dimensions & Perspectives. NCCSE, 3 (None 2011), 112-117.

@article{
author = { C.Mounica, S.Benson Edwin Raj },
title = { A new architecture to perform Phishing via Trojan Horse },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 112-117 },
numpages = 6,
url = { /specialissues/nccse/number3/1871-173/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A C.Mounica
%A S.Benson Edwin Raj
%T A new architecture to perform Phishing via Trojan Horse
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 3
%P 112-117
%D 2011
%I International Journal of Computer Applications
Abstract

Today internet is full of web security threats such as phishing attack, Email bombing, Trojan virus etc., the hackers are increasing in number day by day. They invent new techniques to steal data and confidential information. Here an hybrid approach to launch an phishing attack is proposed. We use Trojan horse, email bombing, data stealing to perform phishing attack. Such approach is a eye open for all people to have an idea, so that they can prevent and avoid threats.

References
  1. Jamie Crapanzano (2003): "Deconstructing SubSeven, the Trojan Horse of Choice", SANS Institute
  2. Carnegie Mellon University (1999): "CERT Advisory CA-1999-02 Trojan Horses".
  3. Gonsalves, Antone (April 25, 2006). "Phishers Snare Victims With VoIP". Techweb
  4. Ponnurangam Kumaraguru, Yong Woo Rhee, Alessandro Acquisti, Lorrie Cranor, Jason Hong and Elizabeth Nunge (November 2006). "Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System" (PDF). Technical Report CMU-CyLab-06-017, CyLab, Carnegie Mellon University.
  5. Maher Aburrous , M.A. Hossain , Keshav Dahal , Fadi Thabtah, “An Intelligent phishing detection system for e-banking using fuzzy data mining”, Expert Systems with Applications 37 (2010) 7913–7921
  6. William stallings, cryptography and network security, Third edition, Prentice Hall the principles and practice of cryptography and network security, 2009
  7. Charles P. Pfleeger “ about trojans, malwares and security of systems” , Security in computing, Prentice-Hall, inc. Upper Saddle River, NJ,2007
  8. Kirda and C. Kruegel, ―Protecting Users against PhishingAttacks with AntiPhish, 29th Annual International Computer Software and Applications Conference, ACM PressWashington, USA, 2005, Vol. 01, pp. 517-524.
  9. Debra L. Cook1, Vijay K. Gurbani1, Michael Daniluk2 “Phishwish: A Stateless phishing filter,” Proc. Symp. Usable Privacy and Security, 2005.
  10. Maher Aburrous , M.A. Hossain , Keshav Dahal , Fadi Thabtah, “An Intelligent phishing detection system for e-banking using fuzzy data mining”, Expert Systems with Applications, (2010) 7913–792
  11. Elliotte Rusty Harold –“Java network programming”,edition 2, “how an mail is sent to client and about java mail API”, published by O'Reilly (2000,2001).
  12. Gantam Prabhu-“Ms Outlook Express Guide (e-book)2001.
  13. Thomas, Robert M- “ DOS 6 instant reference”, all commands used in command prompt, 1993
  14. Andrew S. Tanenbaum-“computer networks”, edition4, “working of networks and new technologies”, published by Pearson Education,Inc.
  15. Pete Loshin –“Big Book of IPsec RFCs: IP Security Architecture”, IP security , (2000)
Index Terms

Computer Science
Information Sciences

Keywords

web security Trojan virus phishing attack