“…Generally, different kinds of phishing attacks include deceptive phishing [3], phishing based on destructive software [4], web trojans [5], pharming [6], phishing injection [7], phishing using fake applications [8], domain hijacking [9], spear phishing [10] and changing user system settings attacks [6]. To confront these attacks many techniques and methods have been invented such Sign-in Seal [11], developing expert system based on characteristics of web pages in order to detect phishing websites [12], genetic algorithm based on anti-phishing techniques [13], detection of phishing attacks based on categorizing super links [14], attribute-based prevention of phishing attacks [15], content based on anti-phishing approach [16], confronting phishing attacks by two step identification [17], detection of phishing pages based on associated relationships [18], detection of phishing pages by comparing the amount of difference between the address string and the white list [19], ranking based antiphishing approach [20], and using data mining algorithms [21].…”