Data Shield Algorithm (DSA) for Security against Phishing Attacks
نویسندگان
چکیده
The World Wide Web provides every internet citizen with voluminous and heterogeneous data. Therefore, it becomes an essential to mine this available data to make it presentable, useful, and pertinent to a particular problem. Web mining deals with the extraction of these interesting patterns and developing useful abstracts from diversified sources. To improve the security of Web services one would increase its Quality, hence pre-fetching scheme are opted which increases network traffic and Web server’s load that is used by DDoS Attack. The DDoS attack mostly targets the computer network’s bandwidth or connectivity. Here the paper focuses on network based DDoS attacks especially the phishing Attacks. This paper concentrates on security against such attack and an novel “Anti-phishing System” is designed with a view to provide an instant, automatic, comprehensive system level solution to perform webpage authentication and webpage detection against phishing and named it as Data Shield algorithm. Data Shield algorithm detects both the known and the unknown phishing attacks. This developed algorithm is ‘Realtime Light weighted Anti-Phishing Algorithm’ that can detect and prevent the users from phishing attacks in the real time.
منابع مشابه
Detecting Fake Websites Using Swarm Intelligence Mechanism in Human Learning
The internet and its various services have made users to easily communicate with each other. Internet benefits including online business and e-commerce. E-commerce has boosted online sales and online auction types. Despite their many uses and benefits, the internet and their services have various challenges, such as information theft, which challenges the use of these services. Information thef...
متن کاملStudy on Protection Against Password Phishing
Phishing attack is new type of network attach and become a major nuisance on the internet. The rapidly progressof phishing attacksthe present secure socket layer is not able to provide and protect users from fraudulent websites. The attacks have been targeted the non-cryptographic security protocols likeTransport layer security and secure socket layerprotocols. These protocols are not sufficien...
متن کاملA novel approach to protect against phishing attacks at client side using auto-updated white-list
Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low detection rate while other solutions like visual similarity and machine learning suffer from the fast access time. In this...
متن کاملKnowledge Base Compound Approach against Phishing Attacks Using Some Parsing Techniques
The increasing use of internet all over the world, be it in households or in corporate firms, has led to an unprecedented rise in cyber-crimes. Amongst these the major chunk consists of Internet attacks which are the most popular and common attacks are carried over the internet. Generally phishing attacks, SSL attacks and some other hacking attacks are kept into this category. Security against ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل