International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 05 | May 2022
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
OFFTECH TOOL AND END URL FINDER Sivaprakash S1, Sasitharan S2, Shrisanjaykumaar3, Suresh Kumar P4 Dept. of Electronics and Communication Engineering, Hindusthan College of Engineering And Technology, Coimbatore ,641 032, Tamil Nadu , India 4Professor, Dept. Of Electronics and Communication Engineering, Hindusthan College of Engineering And Technology, Coimbatore, 641 032 Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - Any online web application that is not properly protected is vulnerable to internet attacks these days. Hackers from all 1,2,3
around the world can attack your website and steal sensitive data or cause significant damage. Other assaults occur when a user visits a website, for example. The link contains malicious JavaScript code, which can be used to steal personal information or a browser session, as well as lead to a variety of scams. Cybercriminals frequently add links to sensitive websites; however, examining every page on the website for linkages to identity theft is useless, time-consuming, and requires security expertise. Everyone understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first determine where a link leads before clicking on it. What happens when we click on the link and use a programmer named Offtech Tool and End URL Finder to transfer our personal information. Key Words: Offtech tool, End url finder, To find the end face of the fake url, Detect the link or Url, Find the original end face of the fake website link direction, detect the direction the link.
1. INTRODUCTION Everyone understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first determine where a link leads before clicking on it. What happens when we click on the link and use a programmer named Offtech Tool and End URL Finder to transfer our personal information. For the scope of this study, mitigation against common attacks on web applications is set, and the webmaster is provided with ways to find criminal hierarchy links to communications developers, research shows the production of web application logs that simplify the process. Analyzing the actions of external users. obsolete, or illegal. Reduction strategies used with secure coding techniques and criminal detection links for sensitive information are developed into a variety of strategies. The advanced application has been tested and tested against various link-based attacks, the results obtained from the test programmer have shown that the website has successfully reduced these malicious web applications attacks, and finding part of the criminal links into critical information, and the best model result provided 98.5% accuracy.
2. EXISTING SYSTEM Web applications Attack is very popular because many organisations are deploying their resources online. From the attackers' perspective, web applications become vulnerable victims, which is why cyber attacks are one of the biggest threats in the online security sector. These attacks can lead to disruptive effects such as the theft of sensitive information and the removal or editing of the site. For the scope of this study, mitigation against common attacks on web applications is set, and the webmaster is provided with mechanisms to detect criminal hacking links that target social media developers, the study also shows the production of web application logs that simplify the process of analysing foreign users' actions. , is off-limits, or illegal. Secure coding approaches are used to build mitigation strategies, and different machine learning algorithms and in-depth learning methods are used to develop methods of acquiring a criminal link to steal sensitive information. The advanced application has been tested and tested against a variety of attack scenarios, and the results obtained during the testing process have shown that the website has successfully reduced this attack on malicious web applications, and that comparisons between different algorithms get the best results in detecting part of the criminal links to steal sensitive information.
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 3118