Font Size: a A A

Design And Implementation Of Phishing Websites Information System Based On Web

Posted on:2018-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z L NieFull Text:PDF
GTID:2428330566998827Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The phishing attack has been a principal threat to online trading,e-commerce and network information security.It has caused a serious economy and trust crisis to the users and the enterprise,not only jeopardizing the benefit and affecting the life of people,but also influencing the development of e-commerce.There are many problems with websites such as poor design,unregulated source code and templates generated,especially high similarity with official websites.In order to cope with the anti-phishing technique effectively,it is important to design a new scheme to discover new phishing pages.At this stage,the research about phishing has the following types: to detect phishing web pages by using characteristics of url,to detect phishing web pages by using detection plugin and to detect phishing web pages by combining the page elements as features.In this system,we emphasize the third method and judges the fact or fiction by comparing the key words of a webpage.As anti-Phishing technology developing,criminals use more methods foe hidden content.In this paper,we use the method of saving the integrated web pages.Besides,we combine with the title of a page and the high frequency words of web text as the key words of a webpage to create reverse index.After that,with the suspicious URL finding by Active detection technology,system uses the comparison verification technology based on the webpage key words.Finally,this paper develops a data management system to matching backstage engines and tasks which uses the software engineering development mode.In this management system,user can manage system configurations,add new tasks,run task,check for the states and results of tasks and check the distribution of phishing webpage.Finally,this issue carries on comprehensive testing to this system in aspect of users.The result shows that this system is basically satisfied for administrators to control engines arranged on server.
Keywords/Search Tags:phishing webpage, key words comparison, reverse index
PDF Full Text Request
Related items