The presence of phishing page is alerted initially upon receiving the Phisher’s solicitation email. Then the IP address, contact information of the host server is retrieved by the system using a tracking program. Next, the system sends notification about the phishing page to the administrator of that server. Finally, it’s the responsibility of the administrator to remove the phishing page from its server, else the administrator have to face the possibility of criminals continuing to use its site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers back, rather than being a reactionary approach that is common to most email filters and anti-virus software. Service-oriented architectures and associated interoperability standards provide key enablers for these service systems. As the business processes are open and distributed processes, the tasks that are performed by service were not centrally controlled, and hence the result is unpredictable. As a result, service outcomes themselves tend to be uncertain. Service monitoring, therefore, remains a significant challenge. The main goal of this research is to develop the detecting methods for monitoring of purchasing process. The key contribution of this paper is the introduction of ontology of communicative acts into these abstraction layers to enhance policy specification and monitoring of service systems. We finally develop this contribution in monitoring of service systems, establishing its feasibility, and going to demonstrate the online purchasing process with multiple scenarios.