An Evaluation of A Country Based Anti- Phishing Approach Using Formal Methods
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
Phishing is a fraudulent attack that steals confidential information by mimicking a trustworthy entity in a medium of electronic communication. In this paper, research was conducted to evaluate a proposed country-based model to detect phishing attacks using formal methods. SPIN model checker was used to check the absence of deadlocks as well as reachable states. SPIN showed that the model has no error since it did not report “invalid end state” as there was no deadlock in the model. There was also no error and unexecuted codes since as all processes had “zero” unreached states and the trail number equaled to “zero”. The aim behind using formal verification is to help checking whether the model is feasible and applicable. This helps deploying the approach model in the real world in order to enhance the country-based phishing countermeasures.
Authors and Affiliations
Abdullah M. Alnajim
AN EFFECEINT MULTI PARAMETERIC CPU SCHEDULING ALGORITHM FOR SINGLE PROCESSOR SYSTEMS
In today’s world, computing systems serve many purposes and imagining a world without them is a nightmare. From the very beginning of the evolution of computer systems, their performance has been a subject of intense int...
A Systematic approach of Software development implementation process-Part I
This research paper most useful for all academics student of computer science. In this paper I have targeted all those student who works on their academic project. Since long time I found most of student not follow actua...
Standalone Command Processor – Onchip Peripheral control and arbiteration
There are many soft-core processors or microcontroller available in contemporary technological world. Many of those when used for and on-chip peripheral control and arbitration are either tend to under use when used for...
A COMPARATIVE STUDY OF CLOUDS IN CLOUD COMPUTING
Cloud computing has now become one of the rapidly growing technologies in computer science. Cloud Computing makes its greatest impact on the IT ecosystem. It refers to the delivery of services like hardware, software, st...
IMAGE MINING TECHNIQUES: A LITERATURE SURVEY
Nowadays, a large portion of information is in visual form; it is essential and certainly pleasing to search for images. Image mining has a variety of applications in various sectors like medical diagnosis, biology, remo...