Detection and Prevention of Phishing Attack Using Linkguard Algorithm
نویسندگان
چکیده
منابع مشابه
Rule-Based Phishing Attack Detection
The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...
متن کاملPrevention of Black Hole Attack in Manet Using Genetic Algorithm
ABSTRACT Recently, Wireless ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Network Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resourceconstrained network. At present, several efficient routing protocols have be...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملDetection and Prevention of Keylogger Spyware Attack
A Keylogger is also known as keystroke logger. It is a software or hardware device which monitors each and every key typed by user on user keyboard. User can not identify the presence of keylogger on user computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children’s or company owner to spy on their empl...
متن کاملDetection and Prevention of SQL Injection attack
SQL injection is a technique where the attacker injects an input in the query in order to change the structure of the query intended by the programmer and gaining the access of the database which results modification or deletion of the user’s data. In the injection it exploits a security vulnerability occurring in database layer of an application. SQL injection attack is the most common attack ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information
سال: 2018
ISSN: 2520-7652
DOI: 10.18488/journal.104.2018.41.10.23