A Survey on Phishing and it’s Detection Techniques Based on Support Vector Method (SVM) and Software Defined Networking(SDN)
A. MahaLakshmi1, N. Swapna Goud2, G. Vishnu Murthy3
1Mahalakshmi, Post Graduate Student, Department of CSE, Anurag Group of Institutions, Hyderabad (Telangana), India.
2N.Swapna Goud, Assistant Professor, Department of CSE, Anurag Group of Institutions, Hyderabad (Telangana), India.
3Dr. G. Vishnumurthy, Professor, Department of CSE, Anurag Group of Institutions, Hyderabad (Telangana), India.
Manuscript received on 13 December 2018 | Revised Manuscript received on 22 December 2018 | Manuscript Published on 30 December 2018 | PP: 498-503 | Volume-8 Issue-2S, December 2018 | Retrieval Number: 100.1/ijeat.B11031282S18/18©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Phishing is a deceitful attempt for obtaining the sensitive information like credit card details, user names and passwords. It is one of the social engineering methods that gathers personal information through websites such as malicious websites and deceptive e-mail to canvass personal information from a company or an individual by prance as a trustworthy entity or organization. Phishing often attacks email by using as a vehicle and even sending messages by email to users that represent a part of a company or an institution who perform business such as financial institution, banking etc. Phishing is becoming more malicious day by day and its detection is very important. In cyberspace, phishing is motivating the researchers to develop the model through which we can develop more security towards the safe services provided by the web. Here we discuss types of phishing and conflicts due to it.
Keywords: Cuckoo Search, Honey Pots, Phishing, Support Vector Method, Software Defined Networking.
Scope of the Article: Software Engineering Methodologies