Font Size: a A A

Design And Implementation Of Phishing Attack Detection System For QR Code Scanning

Posted on:2016-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:B C ZhangFull Text:PDF
GTID:2298330467992613Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile internet technology and the popularity of mobile terminal, users benefit greatly from the network. Meanwhile, internet security faces more threats and is becoming more important. Because of the simplicity of Phishing, Phishing attacks are rampant today and keep rapid growing. The study of Phishing attacks, which has become the preferred method to curb the Phishing attacks effectively, is with high research value.The topic of this thesis is to discuss a better way to detect Phishing attacks. We analyze the features and targets of Phishing, and develop an Android application to detect Phishing attacks for QR code scanning based on sensitive words and Phishing features analysis. The scheme of Phishing detection system includes three steps. First, the sensitive URL detection module determines whether the requested URL is a famous secure website or not. Because the well-known website account for a large proportion of daily network access, this module can make famous websites avoid other detection modules, and improves the users’ usage experience. Second, if the requested URL cannot be judged by sensitive URL detection module, the URL should be detected by blacklist module. The module use real-time phishing websites provided by PhishTank. Last, if the URL is still unable to determine, the system uses feature detection module to determine whether the URL is safe. This module is based on the features of the URL and web page. We also analyze some key technologies in the phishing detection system, including black list quick detection, web page caching system and the assessment algorithm. The solutions of these key technologies improve the system’s performance greatly.This system is developed by Java, and is divided into several modules, which are with low coupling and can be easily implemented. The experiment shows that our method has low false rate, small mem-cost and low time complexity, and is suitable for being used as a reference of project practice.
Keywords/Search Tags:Phishing, Trie, Sensitive features, Phishingdetection
PDF Full Text Request
Related items