A Model for Identifying Phishing E-Mail Based on Structural Properties
A.S. Zadgaonkar1, Suraj Prasad Keshari2, Savita Ajay3

1Dr. A.S. Zadgaonkar, Vice Chancellor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
2Suraj Prasad Keshari, Assistant Professor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
3Savita Ajay, Research scholar, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
Manuscript received on May 05, 2013. | Revised Manuscript received on May 11, 2013. | Manuscript published on May 15, 2013. | PP: 71-74  | Volume-1 Issue-6, May 2013. | Retrieval Number: F0309051613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The widespread use of email caused the number of warnings being made about the dark side our technological revolution to increase and we are becoming uniquely vulnerable to many mysterious and malicious threats. Viruses, worms, and other forms of malicious software started targeting our email inboxes to propagate. Spam and other forms of unsolicited bulk electronic commerce started filling our email inboxes and invading our privacy. Phishing and other forms of fraud attacks have been using email as their primary communication channel to trick users into giving out their credentials. Email could have been a killer application for the Internet if none of the problems mentioned above exist.
Keywords: Phishing, email, privacy, software, Virus, computing.