Downloads: 116 | Views: 329
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014 | Popularity: 6.2 / 10
An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation
Komatla. Sasikala, P. Anitha Rani
Abstract: Phishing is form of creating a similar look-a-like legal website and misleading the customers or users to user their identities or authentication keys such as usernames, passwords, pins to gain the control and then duping the customers by illegal activities such as interpreting data, financial accounts transfer etc mainly phishing is heavily seen in portals like banking, mails etc. This paper presents an anti phishing approach for detecting phishing attacks. Our approach combines a Threshold Value Differentiation approach with machine learning techniques. The Threshold is used as filter that blocks phish web pages used to imitate innocuous user behavior.
Keywords: Phishing, Threshold, Differentiation, Machine learning techniques, Innocuous
Edition: Volume 3 Issue 10, October 2014
Pages: 2323 - 2328
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Comparative Studies, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 194 - 199A Comparative Study of Analyzing Breast Cancer as Benign or Malignant using Machine Learning Algorithms
Nigel Jonathan Renny, Timothy William Richard, Dr. M. Maheswari
Downloads: 0
Research Paper, Computer Science & Engineering, Singapore, Volume 13 Issue 5, May 2024
Pages: 711 - 722General Multi-Objective Performance Expression for Population-Based Search and Optimization
Eik Fun Khor
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 11 Issue 7, July 2022
Pages: 1338 - 1349How to Measure Exam Performance When Different Reading Modes are Employed?
Nallainathan Senthuran, Dr. Indang Ariati Binti Ariffin, Dr. Ali Khatibi, Dr. Jacquline Tham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 1257 - 1264Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform
Bhupendra Ram