Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve the effective phishing detection The result shows that if we focus on user also know using a website genuine or not, we can detect genuine site to avoid wasting network resources
Authors and Affiliations
B. K. Prasath, P. Ashok Kumar
Security Evaluation of Google Chrome Operating System
Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationde...
Reversible Watermarking based on Histogram ShiftingModification:A Review
Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...
Home Automation Using Mobile Communication
Abstract: In the present paper we have designed and implemented a typical and simple Home Automation System using GSM (Global System for Mobile Communication) technology that controls electrical devices at home from a re...
A Variation of Layered STRIFA Pattern Matching for Intrusion Detection
[sub][/sub]Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either no...
A Short Range Wireless Communication Using Android NFC API
In this paper, we are proposing the implementation of short range wireless communication using Android’s NFC API. Near Field Communication is set of protocols used for communication between two android powered and NFC en...