Abstract: In accordance with the principles of the present invention, phishing simulator to provide an real time experience to the employees of the company that how can they be attacked through phishing, we have made software effective enough to train the employees how to react against the attack. When an attacker attacks an employee, the employee receives an message commonly in form of an email to perform a specific operation in the disguise as an trusted sender, such action may lead to high risks. It can lead to malwares, loss of credentials, loss of secured data etc., to prevent this attack we have developed a software which can make the employees aware of an phishing email and thus preventing the crises.
FORM -2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2006
COMPLETE SPECIFICATION
(See section 10 and rule 13)
IDENTIFICATION OF PHISHING VICTIMS WITH THE TOOL BASED ON MACHINE LEARNING
Securelayer7 Technologies Private Limited
an Indian Company of Plot No. 28, Vyankatesh Nagar, Beside Totala Hospital, Jalna Road, Aurangabad -431005, Maharashtra.
Inventor:
Mr Kishor Chandrashekhar Desarda Mr Sandeep Shankar Rao Kamble
The following specification particularly described the invention and the manner in which it is to be performed.
BACKGROUND OF THE INVENTION
When an attacker attacks an employee, the employee receives an message commonly in form of an email to perform a specific operation in the disguise as an trusted sender, such action may lead to high risks. It can lead to malwares, loss of credentials, loss of secured data etc., to prevent this attack we have developed a software which can make the employees aware of an phishing email and thus preventing the crises.
In a phishing attack, an individual (for e.g. a person, an employee of a company, an individual of a computing device) receives a message, commonly in the form of an e-mail, directing the individual to perform an action, such as opening an e-mail attachment or following (for e.g. using a cursor controlled device or touch screen) an embedded link. If such message were from a trusted source (for e.g. co-worker, bank, utility company), such action might carry little risk. Nevertheless, in a phishing attack, such message is from an attacker (for e.g., an individual using a computing device to perform an malicious act on another computer device user) disguised as a trusted source, and an unsuspecting individual, for example, opening an attachment to view a "friend's photograph" might in fact install malicious computer software (i.e., spyware, a virus, and/or other malware) on his/her computer. Similarly, an unsuspecting individual directed to a webpage made to look like an authentic login or authentication webpage might be deceived into submitting his / her username, password or other sensitive information to an attacker.
While there are computer programs designed to detect and block phishing emails, phishing attacks methods are constantly being modified by attackers to evade such forms of detection. The present invention addresses some shortcoming of previous attempts to counter phishing attacks.
SUMMARY OF THE INVENTION
Clown was launched due to the less known facts about phishing to the employees of the industry. If an employee is targeted then the stakes are too high for loss of secured data of a particular company.
In accordance with the principles of the present invention, phishing simulator to provide an real time experience to the employees of the company that how can they be attacked through phishing. Having years of experience in security testing Software Engineering have made software effective enough to train the employees how to react against the attack.
1. Ransomware
2. Business Email Compromise (BEC)
3. Spear phishing attacks
4. Social engineering attacks
5. Malware and malicious attachments
6. Drive by attacks
7. Advanced conversational phishing attacks
DETAILED DESCRIPTION :
Phishing Architecture :
Phishing is a kind of fraud within which the aggressor tries to find out info like login credentials or account info by masquerading as a esteemed entity or person in email, IM or different communication channels.
Typically a victim receives a message that seems to possess been sent by a illustrious contact or organization. AN attachment or links within the message could install malware on the user's device or direct them to a malicious web site established to trick them into divulging personal and money info, such as passwords, account IDs or master card details. Phishing could be a homonym of fishing, that involves victimisation lures to catch fish.
Phishing is fashionable cyber criminals, because it is way easier to trick somebody into clicking a malicious link in an exceedingly on the face of it legitimate email than making an attempt to interrupt through a computer's defenses, though some phishing emails area unit poorly written and clearly pretend, refined cyber criminals use the techniques of skilled marketers to spot the foremost effective kinds of messages - the phishing "hooks" that get the best "open" or click through rate and also the Facebook posts that generate the foremost likes. Phishing campaigns area unit typically engineered round the year's major events, holidays and anniversaries, or cash in of breaking news stories, each true and fictitious.
To make phishing messages seem like they're genuinely from a widely known company, they embody logos and alternative distinguishing info taken directly from that company's web site. The malicious links inside the body of the message area unit designed to form it seem that they're going to the spoofed organization, the utilization of subdomains and misspelled URLs (typo-squatting) area unit common tricks, as is homonym spoofing -URLs created victimisation completely different logical characters to scan precisely sort of a sure domain. Some phishing scams use JavaScript to put an image of a legitimate uniform resource locator over a browser's address bar. The uniform resource locator disclosed by hovering over associate embedded link may be modified by victimisation JavaScript.
Spear phishing attacks are directed at specific people or corporations, whereas incidents that specifically target senior executives inside a corporation area unit termed whaling attacks. Those making ready a spear phishing campaign analysis their victims very well so as to make a additional real message, as victimisation info relevant or specific to a target will increase the possibilities of the attack being self-made. Phishers use social networking and alternative sources {of info | of data | of knowledge} to assemble background information regarding the victim's personal history, their interests and activities. Names, job titles and email addresses of colleagues and key company workers area unit verified, as area unit vacations. This info is then accustomed craft a plausible email. Targeted attacks and advanced persistent threats (APTs) typically begin with a spear phishing email containing a malicious link or attachment.
A entree email filter will lure plenty of mass targeted phishing emails, reducing the quantity of phishing emails that reach users' inboxes. guarantee your own mail servers make use of 1 of the main authentication standards Sender ID or Domain Keys will facilitate cut out spoofed email too. A Web security gateway can additionally offer another layer of defense by preventing users from reaching the target of a malicious link. They work by checking requested URLs against a perpetually updated information of websites suspected of distributing malware.
How to Avoid Phishing?
Phishing is a technique that involves tricking the user to
steal hint passwords, etc, into thinking you're a confidential website. So far
the hackers have used emails to launch this kind of attack, however with the
widespread use of social media networks and smart
phones with net access, the types of attacking are multiplying. These emails embody a link that takes the user to website familiar to own a confidential web site, however they're mere mimics with zero confidentiality.
Thus, cocksure users World Health Organization don't have
adequate antivirus protection can be concerned in attacks that square
measure aimed to steal personal knowledge, and because of the economic
condition that is sadly touching many countries, phishing attacks
attracting folks with the promise of a good job or a straightforward thanks to get cash.
The question is How will we have a tendency to forest all this kind of phishing attack?
1. Learn to spot suspected Phishing Emails
There square measure some qualities that determine AN attack through an email:
i They duplicate the image of a true company. I Copy the name of a corporation or AN actual worker of the corporate.
Include sites that square measure visually just like a true business. . i Promote gifts, or the loss of AN existing account.
2. Check the supply of knowledge From Incoming Mail
3. Never visit Bank's web site by Clicking on Links enclosed in Emails
4. Enhance the protection of laptop
5. Enter Sensitive knowledge in Secure Websites solely
6. Sporadically Check Accounts.
7. Phishing Doesn't solely Pertain to on-line Banking
8. Phishing is aware of All Languages
Phishing is aware of no boundaries, and might reach in any language. In general, they're poorly written or translated, thus this might be another indicator that one thing is wrong.
9. Have the Slightest Doubt, don't Risk It
The best thanks to forestall phishing is to systematically reject any email or news that asks to produce confidential knowledge.
10. Check Back often to examine the Evolution of Malware.
System Architecture :
The minimum system necessities for the Clown to run on Server Machine will be
OS: Centos/RHEL 7. 64-bit
Processor: 2.4 GHz
Memory: 4 GB RAM
Network: Broadband internet connection
Hard Drive: 20 GB available space
The minimum system necessities for the Clown to run on Client Machine will be
OS: Microsoft Windows, Linux, Apple Mac
Processor: 2.4 GHz
Memory: 1 GB RAM
Network: Broadband internet connection
Hard Drive: 20 GB available space
A information method system acceptable for storing and/or executing the corresponding program code can embrace a minimum of 1 processor coupled directly or indirectly to computerized knowledge storage devices like memory components. Input/output (I/O) devices (including but not restricted to keyboards, displays, inform devices, etc.) is also coupled to the system. Network adapters is also coupled to the system to change the data method system to become coupled to totally different process systems.
The systems and ways that delineate herein is also enforced victimization programming languages like JavaScript™, Nodejs, Pug, HTML, etc., or a mix of programming languages, still as compiled or taken languages, and
will be deployed in any sort, still as as an entire program or as a module, component, subroutine, or totally different unit acceptable to be employed in a computing setting. The package can embrace, but is not restricted to, firmware, resident package, microcode, etc. Protocols like SOAP/HTTP to boot utilised in implementing interfaces between programming modules. The components and usefulness delineate herein is additionally enforced on any desktop OS including, but not restricted to, utterly totally different versions of Microsoft Windows™, Apple™ Mac™, iOS™, Unix™/X-Windows™, Linux™, etc. The system will be enforced using a internet application framework, like Node.js.
The communications network can embody wireline communications capability, wireless communications capability, or a mixture of every, at any frequencies, victimization any variety of common place, protocol or technology, additionally, among the gift half, the communications network is also a personal network (for example, a VPN) or a public network (for example, the Internet).
A non-inclusive list of exemplary wireless protocols and technologies utilised by a communications network may embody general packet radio service (GPRS) jointly enclosed at varied generation wireless technologies, degree exemplary non-inclusive list of primarily wireline protocols and technologies utilised by a communications network includes asynchronous transfer mode (ATM), inflated interior entree routing protocol (EIGRP), frame relay (FR), high-level link management (HDLC), internet management message protocol (ICMP), interior entree routing protocol (IGRP), internetwork packet exchange (IPX), ISDN, transmission management protocol/internet protocol (TCP/IP), routing information protocol (RIP) and user datagram protocol (UDP). As versatile persons will acknowledge, the opposite celebrated or anticipated wireless or wireline protocols and technologies is also used.
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
The invention will now be described in relation to the accompanying drawing, in which :
FIG. 1 illustrates Login data flow diagram and working of the same:-
In general computer usage, login is the procedure used to get access to an operating system or application, usually in a remote computer. Almost always a login requires that the user have (1) a user ID and (2) a password. Often, the user ID must conform to a limited length such as eight characters and the password must contain at least one digit and not match a natural language word. The user ID can be freely known and is visible when entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some Web sites require users to register in order to use the site; registered users can then enter the site by logging on.
FIG. 2 illustrates Data Flow diagram and working if the password is forgotten :-
If you have forgotten your password and you previously entered an email address when signing up for the account or in your Preferences, and you still have access to that email account, then this special page can help you recover access to your account.
FIG. 3 illustrates registration of the new user and saving it in the database:-
In general computer usage, registration is the procedure used to get a registered access to an operating system or application, usually in a remote computer. Almost always a registration requires that the user have
(1) a user ID
(2) a password
(3) User name
(4) Email
Often, the user ID must conform to a limited length such as eight characters and the password must contain at least one digit and not match a natural language word. The user ID can be freely known and is visible when entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some Web sites require users to register in order to use the site; registered users can then enter the site by logging on.
FIG. 4 illustrates Data flow diagram of the MailBox Management:-
In this page we can manage the mail box. MailBox Management sates that the user can create a group of mail that are to be targeted over a network.
FIG. 5 illustrates a report on how phishing attack takes place.:-
Most people associate phishing with e-mail messages that spoof, or
mimic, banks, credit card companies or other business
like Amazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam.
From beginning to end, the process involves:
1. Planning :
Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers.
2. Setup :
Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addresses and a Web page.
3. Attack :
This is the step people are most familiar with - the phisher sends a phony message that appears to be from a reputable source.
4. Collection.
Phishers record the information victims enter into Web pages or popup windows.
5. Identity Theft and Fraud
The phishers use the information they've gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover.
CLAIM :-
1)ln accordance with the present invention, we are securing clients critical assets and making their IT infrastructure attack-proof.
2)ln accordance with the present invention, our security testing services have been designed in a way that simulate the activities of a malicious attacker thus providing accurate assessment of the network, applications and everything else that is somehow associated with the IT infrastructure.
3) In accordance with the present invention, we go a step ahead in delivering quality services tailored client's needs. We are tried to serve as the most comprehensive security solution to the clients.
4) In accordance with the present invention, we need to look at security as deep as attackers are going. We provide with a layered security architecture which provides information security services and solutions at deeper level of the infrastructure, not just the perimeter.
5) ln accordance with the present invention, we provide the best and most cost efficient application security.
| # | Name | Date |
|---|---|---|
| 1 | 201721020085-FORM 2-31-05-2018.pdf | 2018-05-31 |
| 2 | 201721020085-FORM 2(TITLE PAGE)-31-05-2018.pdf | 2018-05-31 |
| 3 | 201721020085-DRAWING-31-05-2018.pdf | 2018-05-31 |
| 4 | 201721020085-DESCRIPTION(COMPLETE)-31-05-2018.pdf | 2018-05-31 |
| 5 | 201721020085-CLAIMS 2-31-05-2018.pdf | 2018-05-31 |
| 6 | 201721020085-ABSTRACT-31-05-2018.pdf | 2018-05-31 |
| 7 | Abstract1.jpg | 2018-08-11 |
| 8 | 201721020085-Form 2 (Title Page)-080617.pdf | 2018-08-11 |
| 9 | 201721020085-Form 1-080617.pdf | 2018-08-11 |