A Review and Proof of Concept for Phishing Scam Detection and Response using Apoptosis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Phishing scam is a well-known fraudulent activity in which victims are tricked to reveal their confidential information especially those related to financial information. There are various phishing schemes such as deceptive phishing, malware based phishing, DNS-based phishing and many more. Therefore in this paper, a systematic review analysis on existing works related with the phishing detection and response techniques together with apoptosis have been further investigated and evaluated. Furthermore, one case study to show the proof of concept how the phishing works is also discussed in this paper. This paper also discusses the challenges and the potential research for future work related with the integration of phishing detection model and response with apoptosis. This research paper also can be used as a reference and guidance for further study on phishing detection and response.
Authors and Affiliations
A Yahaya Lawal Aliyu, Madihah Mohd Saudi, Ismail Abdullah
Creating and Protecting Password: A User Intention
Students Academic Information System (SAIS) is an application that provides academic information for the students. The security policy applied by our university requires the students to renew their SAIS password based on...
Intelligent Classification of Liver Disorder using Fuzzy Neural System
In this study, designed an intelligent model for liver disorders based on Fuzzy Neural System (FNS) models is considered. For this purpose, fuzzy system and neural networks (FNS) are explored for the detection of liver d...
Compliance-Driven Architecture for Healthcare Industry
The United States (US) healthcare organizations are continuously struggling to cope-up with evolving regulatory requirements e.g. Health Information Technology for Economic and Clinical Health Act (HITECH) and Internatio...
Cloud CRM: State-of-the-Art and Security Challenges
Security undoubtedly play the main role of cloud CRM deployment, since the agile firms utilized cloud services in the providers infrastructures to perform acute CRM operations. In this paper researcher emphasis on the cl...
A Comparative Study of White Box, Black Box and Grey Box Testing Techniques
Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. So...