An Evaluation of A Country Based Anti- Phishing Approach Using Formal Methods
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
Phishing is a fraudulent attack that steals confidential information by mimicking a trustworthy entity in a medium of electronic communication. In this paper, research was conducted to evaluate a proposed country-based model to detect phishing attacks using formal methods. SPIN model checker was used to check the absence of deadlocks as well as reachable states. SPIN showed that the model has no error since it did not report “invalid end state” as there was no deadlock in the model. There was also no error and unexecuted codes since as all processes had “zero” unreached states and the trail number equaled to “zero”. The aim behind using formal verification is to help checking whether the model is feasible and applicable. This helps deploying the approach model in the real world in order to enhance the country-based phishing countermeasures.
Authors and Affiliations
Abdullah M. Alnajim
An Insight about Current Research Ideas in Wireless Communication-A Review
In the telecommunications sector, wireless industry has proliferated its growth to such an extent that everyone in the world is a user of some form of developing technology. Wireless communications is one of the most cel...
PPCLSS: Probabilistic Prediction Coefficient Link Stability Scheme based Routing in MANETs
Ensuring the stability of a link in MANETs is mandatory to prolong the lifetime of a network. Probabilistic Prediction Coefficient Link Stability Scheme (PPCLSS) based routing is proposed for MANETS. Link loss is found b...
An overview of Object Oriented Metrics A complete Survey
Object oriented metrics have become more important in software engineering field. They are used to measure software quality and to estimate the cost, to enhance the reliability, maintainability and effort of software pro...
An improved load balancing adaptive QoS buffer scheduler (I-LABS) for streaming services over MANET
Large variations in network Quality of Service (QoS) in terms of bandwidth, latency, jitter may occur during media transfer over Mobile Ad-hoc Networks (MANETs). Researchers have identified that complex computing applica...
Human Authentication Using Biometric Recognition
Authentication is the primary requirement for any system by means of privacy & security. Physiological biometrics is based on direct measurements of a part of the human body, such as finger-scan, facial scan, iris-sc...