Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve the effective phishing detection The result shows that if we focus on user also know using a website genuine or not, we can detect genuine site to avoid wasting network resources
Authors and Affiliations
B. K. Prasath, P. Ashok Kumar
Distributed Heterogeneous Big Data Mining Adaptation in the Cloud: a Survey
Abstract: Big Data Mining in the Cloud is the capability of integrating and extracting useful information from large datasets or streams of data in the on demand computing environment which were not possible before due t...
Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing
Abstract: The increasing use of cloud computing resources have placed a large workload on the data centers. Solving the load balancing problem among all virtual machines (VMs) increases performance, throughput and...
Design Approach to Big data Systems in Developing and Maintaining the Information Security Systems
Abstract: Data is accumulating from almost all aspects of our everyday lives that it becomes huge and multistructuredand has hidden useful information. The challenges with Big Data include capture, curation, storage, sea...
Studying the Performance of a Local Area Network through a Statistical Results of a Simulation Program
The ring topology was selected among several topologies,since in the ring topology easy to isolate faults and it has good performs under heavy network load, but the most problem that face in the ring topology is th...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...