Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve the effective phishing detection The result shows that if we focus on user also know using a website genuine or not, we can detect genuine site to avoid wasting network resources

Authors and Affiliations

B. K. Prasath, P. Ashok Kumar

Keywords

Related Articles

 Security Evaluation of Google Chrome Operating System

 Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationde...

 Reversible Watermarking based on Histogram ShiftingModification:A Review

 Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...

Home Automation Using Mobile Communication

Abstract: In the present paper we have designed and implemented a typical and simple Home Automation System using GSM (Global System for Mobile Communication) technology that controls electrical devices at home from a re...

A Variation of Layered STRIFA Pattern Matching for Intrusion Detection

[sub][/sub]Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either no...

A Short Range Wireless Communication Using Android NFC API

In this paper, we are proposing the implementation of short range wireless communication using Android’s NFC API. Near Field Communication is set of protocols used for communication between two android powered and NFC en...

Download PDF file
  • EP ID EP162797
  • DOI 10.9790/0661-1623116119
  • Views 97
  • Downloads 0

How To Cite

B. K. Prasath, P. Ashok Kumar (2014). Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 116-119. https://europub.co.uk/articles/-A-162797