Академический Документы
Профессиональный Документы
Культура Документы
Anupriya.T,Padmavathy.M,Vaishnavi.M, Vinithra.G
Alekhya Lakshmi.L Assistant.Professor,CSE
Department of Computer Science Engineering, Sri Sairam Institute of Technology, Chennai ,India
Sri Sairam Institute of Technology, Chennai ,India. vinithra.cse@sairamit.edu.in
priyaanutj@gmail.com
madhupadma2297@gmail.com
vaishnavidharan29@gmail.com
alekhyalakshmilakki@gmail.com
Fig 2.a
As India is moving towards Digitilization the The system will starts working when the user links the
increasing in cyber crimes will effect the day to day life a link which is received from the social media.The system will
common man [7].The main focus of this project is to bring extract the link from the app and search the subsequent link in
series to the current system by eliminating all these problems the database. If the link if found in the database if will alert the
and providing a secure environment form cyber crimes . It is user else the link is forwarded to the next module of the system.
also a prospect for Digital India.
2)Converter:
The primary design constraint is the Mobile
Application. Since the application is designated for Android
In this module we fetch the link from the first module
Mobiles, effective GUI[8] and well user friendliness will be the
and convert the ASCII characters into the UNICODE format
major design considerations. Creating a user interface which is
.If there is any error in the unicode the system will alert the
both effective and easily traversable is important. We are
user,else the obtained Unicode is transferred to the next module
utilizing the database to store the various information of the
of the system. To convert the fetched link we use UTF-8[3]
spoofed weblinks so storage space needs to be considered for
encoding algorithm.
smooth functioning of system. Other limitation such as memory
and processing power are also worth considering. Efficiency
3)Module 2 :
needs to be considered since it is one of the major reasons of
having an automated system . The input and output generated
In this module the system will generate the puny code
and their individual working efficiency and its contribution to for the obtained Unicode. After generating puny code the
the overall software application must also be considered. The system will check for errors along with the certain conditions
software will give the desired results as output,now system that have to be followed by the puny code of the given
workflow as shown below.
URL[4]. If the obtained puny code does has any errors then way that many browsers interpret Punycode or the extracted
the system will alert the user , else it is forwarded to the next link is found in the database and will display the warning The
module of the system. link is not safe to visit.The 2 operations to be performed by the
user :
4)Premonitory System:
In this module it will alert the user if the user visits 1. Open in browser : This will allow the user to visit the
any malicious link and if the user visits a safe link then it will link in browser
2. Back to application : This will redirect the visitor to
direct it to that particular website .So that the user can access
the source application (i.e WhatsApp or any other
the link safely.
app).
V. SYSTEM DESIGN
PUNYCODE: Punycode be the simplest way of
representing Unicode, the standard method by which computers
Design : The planning of the project may be divided encode text of non-Roman languages such as Arabic or
into three phases that are as follows : Mandarin and accented characters such as "ü". Using
Punycode, URLs containing Unicode characters are
User Interface Style : During this section the Computer diagrammatical as American Standard Code for Information
Program of the project is developed. That is, the planning Interchange characters consisting of letters, digits and
of our application via that the user can move for the hyphens[8][9]. The problem arises in the fact that similar
warning issued as per the cases. characters are hard to distiguish from each other. While
Database : The database is the pool of information for a Cyrillic small letter "a" (Unicode character U+0430) is
every application .In our application, the database is used different from a Latin small letter "a" (U+0061), in a vulnerable
to store the most popular websites spoofed link and browser they look the same when the Punycode is interpreted.
malicious sites link that appearance the same as high 10k Therefore, the owner of the name xn--80ak6aa92e.com, which
domains of Alexa. The information also will store each is displayed as "apple.com" could create a convincing phishing
web site that it’ll observe as “Not Safe” and so create our site.
method quick to observe the identical issue within the
next future occurrence.The below diagrams shows the
representation between different entities of our project. The vulnerability was highlighted by researcher who has
Complete Design: In this section a complete flow set up the link starting with “xn” for users to check how their
diagram of the working system is designed.As per the browser using application,it interprets a Punycode site. If the
following three stages, we will now start our computer address reads "https://apple.com", this means the
implementation of the project. browser is vulnerable. "Visually, the 2 domains are
indistinguishable because of the font employed by Chrome
VI. IMPLEMENTATION and Firefox. As a result, it becomes not possible to spot the
location as fallacious while not rigorously inspecting the site's
The below diagram shows the implementation and working of URL or SSL certificate.The act of taking advantage of this
the project. vulnerability is known as an internationalised domain name
(IDN)[9] homograph attack - or more simply as a homograph
spoofing attack.
[1]. A. Solanki and S. Dogiwal, “Implementation of an anti- [14].Weber, C. (2008a). The Lookout : Unicode security attacks
phishing tech- nique for secure login using usb (iatslu),” in and test cases Visual Spoofing,IDN homograph attacks,and the
Computational Intelligencein Data Mining-Volume 1. Mixed Script Confusables. from
Springer, 2015, pp. 221–231. https://www.lookout.net/2008/12/unicode-attacks-and-test-
cases-visual_11.html.