PHISHSTORM: Detection Mechanism for Finding the Phishing and Legitimate Web Sites by Implementing the Search Engine
R. Murugeswari1, G. Elizabethrani2, G. Rama Sakthi3, B. Atchaiya4

1R. Murugeswari, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
2G. Elizabethranii, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
3G. Ramasakthi, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
4B. Atchaya, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
Manuscript received on 01 December 2019 | Revised Manuscript received on 19 December 2019 | Manuscript Published on 31 December 2019 | PP: 597-601 | Volume-8 Issue-4S2 December 2019 | Retrieval Number: D11201284S219/2019©BEIESP | DOI: 10.35940/ijrte.D1120.1284S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper proposes software for detecting the phishing and legitimate websites. In that software, we build and explain the mechanism behind the detection of the phishing and legitimate websites. Phishing is defined as a fraudulent attempt, used to obtain confidential information through which an attacker emulates an actual person or institution by disguising them as an official person or entity through e-mail or other communication mediums. We created this project to safeguard the users from the phishing websites so that they won’t lose their personal details like usernames, passwords and credit card details. Here, we combined Storm in the architecture, thereby detecting the phishing and legitimate URL’s manually. A bloomfilter is a space-efficient data structure used to test the element either present in the set or may not be in the set. The simulation is carried out in the search engine, entering the search word, viewing the phishing and legitimate websites, downloading the files, give feedback about the websites and transformation is done wherever it is needed.
Keywords: Phishing Websites, Storm Architecture, Bloom Filter.
Scope of the Article: Internet and Web Applications