TY - JOUR T1 - An Anti-Web Phishing Application for Analysing the Security of Websites AU - Fowdur, T.p. AU - Khader, R. Abdool PY - 2018 DA - July DO - 10.17694/bajece.435864 JF - Balkan Journal of Electrical and Computer Engineering PB - MUSA YILMAZ WT - DergiPark SN - 2147-284X SP - 146 EP - 152 VL - 6 IS - 3 LA - en AB - Nowadays, one of the major internet securityproblems being faced is ‘Web Phishing’, whereby attackers get hold of thepersonal and sensitive information of the internet users. Sometimes, attackerscreate fake web pages just to mislead users and give them wrong information.With the increase of more and more sophisticated attacks like Whale Phishing,Spear Phishing, and Ransomware among others, internet users easily fall inattackers’ traps. Most web browsers are not able to counteract or block theseattacks and hence internet users consider the spoofed webpages to be legitimateones and end up giving their details like credit cards details, passwords andusernames among others. In this paper, an application has been developed inJava that performs several tests on a URL, on the different hyperlinks presenton the web page and on the content of the web page and provides a securityrating to the internet user. Together with the percentage security, the user isinformed if the web page is safe, doubtful or unsafe. The security ratings ofseveral website domains such as, .gov, .co, .edu, .info, .mu, .ac, .org, .net,.com were also analysed. Furthermore,tests using independent samples ANOVA and Tukey HSD were performed and theyrevealed that there was a significant difference between the security ratingsof the websites. KW - Phishing KW - IP KW - URL KW - Web Security CR - Aaron G. and Rasmussen R., Global Phishing Survey: Trends and Domain Name Use in 2016, pp. 5, 2017. CR - Chelliah G. A and Aruna S., Preventing Phishing Attacks Using Anti-Phishng Prevention Technique, International Journal of Engineering Development and Research, pp. 60- 63, 2014. CR - Khan A. A., Preventing Phishing Attacks using One Time Password and User Machine Identification, International Journal of Computer Application, vol. 68, no. 3, pp. 7-11, 2013. CR - Avast Support. 2018. Avast Online Security browser extension – Getting Started | Official Avast Support. [Online] Available at: https://support.avast.com/en-au/article/18/ [Accessed 23 November 2017] CR - Safe Browsing – Google Safe Browsing. 2018. [Online] Available at: https://safebrowsing.google.com/ [Accessed 9 January 2018] CR - Kirda E. and Krugel C., Protecting Users Against Phishing Attacks, The Computer Journal, vol. 00, no. 0, pp. 1-8, 2005. CR - Naresh U., Sagar U. V. and Reddy C. V. M, Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 14, no. 3, pp. 28-36, 2013. CR - WOT Services Ltd.,2018. Web of Trust (WOT) – Crowdsourced web safety | WOT (Web of Trust). [Online] Available at: https://www.mywot.com/en/aboutus [Accessed 10 September 2017] CR - TrustWatch – WEB SITE VERIFICATION SERVICE. [Online] Available at: https://www.trustico.co.in/material/DS_TrustWatch.pdf [Accessed 29 October 2017] CR - Jain A. K. and Gupta B. B., Phishing Detection: Analysis of Visual Similarity Based Approaches, Security and Communication Networks, vol. 2017, pp. 1-20, 2017 CR - Wanawe K., Awasare S. and Puri N. V., An Efficient Approach to Detecting Phising A Web Using K-Means and Naïve- Bayes Algorithms, International Journal of Research in Advent Technology, vol. 2, no. 3, pp. 106-111, 2014 CR - Alkhozae M. G. and Batarfi O. A., Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code, International Journal of Information and Communication Technology Research, vol. 1, no. 6, pp. 283-291, 2011 CR - The State of Security. 6 Common Phishing Attacks and How to Protect Against Them, 2018. [Online] Available at: https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/ [Accessed 8 April 2018] CR - Ho G., Sharma A., Javed M., Paxson V. and Wagner D., Detectimg Credential Spearphishing Attacks in Enterprise Settings, usenix, pp. 469-484, 2017. CR - The State of Security. 6 Common Phishing Attacks and How to Protect Against Them, 2018. [Online] Available at: https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/ [Accessed 8 April 2018] CR - Chaudhry J. A, Chaudry S. A. and Rittenhouse R. G., Phishing Attacks and Defences. International Journal of Security and its Application, vol. 10, no. 1, pp. 247-256, 2016. CR - Tracking Protection | Firefox Help. 2018. Tracking Protection | Firefox Help. [Online] Available at: https://support.mozilla.org/en-US/kb/tracking-protection [Accessed 3 January 2018] CR - Lane D. M., Analysis of Variance. Online Statistics Education B. pp. 517-598 CR - Sun T, Spam Filtering based on Naïve Bayes Classification, pp. 1-42, 2009 CR - Heron E., Analysis of Variance – ANOVA, 2009. [Online] Available at: https://www.tcd.ie/medicine/neuropsychiatric-genetics/assets/pdf/2009_3_ANOVA.pdf [Accessed 9 December 2017] CR - Analysis of Variance (ANOVA) [Online] Available at: https://www.calvin.edu/~scofield/courses/m143/materials/handouts/anova1And2.pdf [Accessed 15 December 2017] UR - https://doi.org/10.17694/bajece.435864 L1 - https://dergipark.org.tr/tr/download/article-file/519175 ER -