3 research outputs found

    Phishing prediction in e-banking using data mining techniques

    Get PDF
    Phishing is a form of electronic identity stealing in which a mixture of social engineering and web site spoofing techniques is used to trap a user into useful confidential information with financially viable value in e-banking. In detecting and identifying e banking phishing websites, Classification Data Mining (DM) Techniques can be a very useful tool. In this paper, we considered and implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy in e-banking. We also compared their performances, accuracy, number of rules generated and speed. The experimental results demonstrated the feasibility of using Associative Classification techniques in real e-banking applications and its better performance as compared to other traditional classification algorithms. We present a novel approach to overcome the difficulty and complexity in detecting and predicting ebanking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity and Security and Encryption criteria in the final phishing detection rate

    Phishing attack prediction by smart mobile devices

    Get PDF
    In recent times, phishing is a wide spread technique to steal user’s authentication information, especially password. The key issue is that it is difficult for user to differentiate fake Login User Interface from normal login. This paper presents a unique method to predict phishing by smart device. In our technique, a smart device pre-stores feature information of Login User Interface. Before entering authentication information, a plug-in of Web browser at host side will verify the validation of Login Inter face according to pre-stored Login Interface information. Wi-Fi provides a communication channel between the plug-in and the smart device. Furthermore, the smart device can automatically fill the field of user id and password to the Login User Interface if Login User Interface passes the verification of smart mobile device. Compared with other solutions, this solution cans greatly improve the security of authentication

    Dynamic cluster head routing protocol in wireless sensor network

    Get PDF
    Wireless distributed based microsensor systems will have reliable monitoring in variety of environments for both civil and military applications. In this research work, we look at communication protocols, which can have significant impact on the overall energy dissipation of the networks in these systems. Based on the findings that the conventional protocols of direct transmission, minimum-transmission-energy, multihop routing, and static clustering may not be optimal for sensor networks.Therefore we propose DCHRP (Dynamic Cluster Routing Protocol), a cluster-based protocol that utilizes instance cluster creation to evenly distribute the energy load among the sensors in the network. DCHRP uses instance clusters to enable scalability and strength for dynamic networks. In addition to this, DCHRP is able to reduce the energy wastage evenly among the sensors, and allowing easy dynamicity in WSNs
    corecore