An Evaluation of A Country Based Anti- Phishing Approach Using Formal Methods
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
Phishing is a fraudulent attack that steals confidential information by mimicking a trustworthy entity in a medium of electronic communication. In this paper, research was conducted to evaluate a proposed country-based model to detect phishing attacks using formal methods. SPIN model checker was used to check the absence of deadlocks as well as reachable states. SPIN showed that the model has no error since it did not report “invalid end state” as there was no deadlock in the model. There was also no error and unexecuted codes since as all processes had “zero” unreached states and the trail number equaled to “zero”. The aim behind using formal verification is to help checking whether the model is feasible and applicable. This helps deploying the approach model in the real world in order to enhance the country-based phishing countermeasures.
Authors and Affiliations
Abdullah M. Alnajim
Genetic Approach to Find Optimal Moves for Prisoner Dilemma Game
The Prisoner‘s Dilemma, a simple two-person game invented by Merrill Flood & Melvin Dresher in the 1950s, has been studied extensively in Game Theory. Till now the work has been done to study the environment in which...
Secure Socket Layer Implementations-A Review
Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in betwe...
Various Aspects of Minutia As a Fingerprint Feature
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerpr...
AI Banking Agent
Our application is designed for the web-clients of banks. Although, banks are always looking out for powerful and user friendly applications while upgrading their website [18], our platformindependent AI application uses...
A Comparative Review on Hierarchical based and Distance Based Leach Protocol
Wireless Networking is a tools in which numeral mobile nodes can converse with each other openly or not directly through wireless relations. A sensor network is poised of a great number of sensor nodes and a sink. In the...