Detection and Prevention of Phishing Attack Using Linkguard Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rule-Based Phishing Attack Detection

The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...

متن کامل

Prevention of Black Hole Attack in Manet Using Genetic Algorithm

ABSTRACT Recently, Wireless ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Network Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resourceconstrained network. At present, several efficient routing protocols have be...

متن کامل

Phishing website detection using weighted feature line embedding

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

متن کامل

Detection and Prevention of Keylogger Spyware Attack

A Keylogger is also known as keystroke logger. It is a software or hardware device which monitors each and every key typed by user on user keyboard. User can not identify the presence of keylogger on user computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children’s or company owner to spy on their empl...

متن کامل

Detection and Prevention of SQL Injection attack

SQL injection is a technique where the attacker injects an input in the query in order to change the structure of the query intended by the programmer and gaining the access of the database which results modification or deletion of the user’s data. In the injection it exploits a security vulnerability occurring in database layer of an application. SQL injection attack is the most common attack ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information

سال: 2018

ISSN: 2520-7652

DOI: 10.18488/journal.104.2018.41.10.23