International Journal of Computer Science and Engineering Communications, Vol.4, Issue.1, Page.1329-1336, (2016) www.scientistlink.com/ijcsec 1329 Scientist Link Group of Publications Phishing Attack Prevention in Corporate Companies for Internet Voting with Secure Authentication Nisha.S 1 , A.Neela Madheswari 2 PG Scholar, Associate Professor, Computer Science and Engineering Mahendra Engineering College, Namakkal, India s.nish92@gmail.com 1 , neela.madheswari@gmail.com 2 Abstract - Corporations and organizations routinely use Internet voting to elect officers and Board members and for other proxy elections. Online voting refers to both the electronic means of casting a vote and the electronic means of tabulating votes. Using just a small sample of reported phishing content, a fairly good picture of which hosting providers may be more vulnerable to compromise or more forgiving of malicious behavior can be captured. This information can be useful when considering where to host the website or online service. Voting system with Visual Cryptography has been used for an efficient authentication of users to cast vote for confidential internal corporate decisions. Voters who bypass authentication or have already voted are denied access to the ballot. One-vote-per-voter is guaranteed by marking electors as voted and storing the vote in a single transaction. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if the candidate logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e- mail id before election and share 2 will be available in the voting system for candidate’s login during election. Voter will get the secret password to cast the vote by combining share 1 and share 2 using Visual Cryptography. Thus a new approach is proposed to protect users across a network from phishing attacks. Keywords – Authentication, Cryptography, Image captcha, Integer linear program, Internet voting, Phishing. I. INTRODUCTION Fraudsters send fake emails or set up fake web sites that mimic. Phishing is a form of online identity theft in which fraudsters trick Internet users into submitting personal information to illegitimate web sites. Phishing scams are usually presented in the form of spam or pop-ups and are often difficult to detect. Once the fraudsters obtain the personal information, they can use it for all types of identity theft, putting the good credit and good name at risk. Phishers are becoming more and more sophisticated in designing their phony websites. Because phishing is one of the most devious forms of identity theft, it is important for us to become familiar with various types of phishing scams as well as to learn how to guard against them. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password [1]. Cryptography is the science of providing security for information. It has been used historically as a means of providing secure communication between individuals, government agencies, and military forces. Today, cryptography is a cornerstone of the modern security technologies used to protect information and resources on both open and closed networks [2]. Authentication is a process for verifying the identity of something or someone. When we authenticate an object, the goal is to verify that we have the genuine article. When we authenticate a person, the goal is to verify that we are not dealing with an imposter. Applications are required to implement their own mechanisms for determining the level of a user's authorization. Applications often do this by maintaining private lists that contain the names of users who are authorized access. Database applications, for example, often maintain private authorization tables to control the fields in a record that a particular user can view or change. There are different kinds of applications based on the Internet. One of them is online voting system. Several people advocate the benefits it can bring such as improved speed and accuracy in counting, accessibility, voting from home and as many are concerned with the risk it poses, such as unequal access, violation to secrecy and anonymity and alteration of the results of an election [3]. This paper focuses on the prevention of phishing attacks and secured authentication for Internet voting system using Visual Cryptography. The section II gives the detailed description of phishing techniques in general, section III explains the role of Visual Cryptography for anti-phishing, section IV explains the different kinds of voting systems, the section V proposed a new approach for Internet voting system with anti-phishing implementation and section VI concludes the proposal.