scispace - formally typeset
Proceedings ArticleDOI

Desktop phishing attack detection and elimination using TSO program

TLDR
A TSO programmatically solution to Desktop phishing attack, which has a capability to detection and prevention of the attack.
Abstract
In today's computer world security is the major issue. For every project most of the money spent on the security and testing than developing. Because security issue is one of the major issue for everyone to protect data. According to the security analysts more than seven billion hackers are existing over one hundred and five billion computers. Almost all of them trying to collapse the security system. There are so many security attacks are rotating throughout the network. Phishing is one of the popular security attack on the websites due to fall in this attack we lose our valuable information. Today most of us are using e-commerce websites for online shopping. Most of them are paying money through online. By taking this as an advantage so many hackers are host phishing website for stealing our bank and credit card detail. No only this so many social accounts are hacking daily. Other than this there is a new model of attack that is Desktop phishing. It is one of the advance attack which is applied on victim computer it can prevent the victim user actions in websites. By that we don't allow to the real page even to modify of change our password. By that the attacker success his goal. For phishing detection there are so many solutions are available. But Till now so many antiviruses can't find this attack. So we prose a TSO programmatically solution to Desktop phishing attack. It has a capability to detection and prevention of the attack.

read more

Citations
More filters
Journal ArticleDOI

Speech recognition with improved support vector machine using dual classifiers and cross fitness validation

TL;DR: The proposed speech recognition method offers 98.2% accuracy and consists of a linear dual classifier that finds the same class attributes and different class attributes simultaneously and a cross fitness validation method to prevent over fitting problem.
Journal ArticleDOI

IoT based fall detection and ambient assisted system for the elderly

TL;DR: A fall detection algorithm that uses accelerometer and gyroscope sensor to predict the fall correctly and reduce the false positives and false negatives and increase the accuracy and can be used in real-time.
Journal ArticleDOI

Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform

TL;DR: Experimental results show that the proposed algorithm can preserve the edges and textures very well while weakening the noise can obtain better suppressed noise and enhances the objective of evaluations than other noise removal methods.
Journal ArticleDOI

Modified hybrid multilevel inverter with reduced number of switches for PV application with smart IoT system

TL;DR: The bound unified power quality conditioner has been proposed to upgrade the power quality in wind energy frameworks and a nine-level inverter is planned using a capacitor decision design with a full-interface control converter, related to course.
Journal ArticleDOI

Optimal body mass index cutoff point for cardiovascular disease and high blood pressure

TL;DR: The proposed work is concerned in predicting the probability of CVD and high blood pressure in India, and the disease has been predicted with body mass index value; from the health reports of India, the pervasiveness ofCVD and HBP is identified and Bayesian model is used to find the pervasive based on the gender and the place of living.
References
More filters
Proceedings ArticleDOI

The battle against phishing: Dynamic Security Skins

TL;DR: A new scheme is proposed, Dynamic Security Skins, that allows a remote web server to prove its identity in a way that is easy for a human user to verify and hard for an attacker to spoof.
Journal ArticleDOI

Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)

TL;DR: An effective approach to phishing Web page detection is proposed, which uses Earth mover's distance (EMD) to measure Web page visual similarity and train an EMD threshold vector for classifying a Web page as a phishing or a normal one.

Fuzzy data mining and genetic algorithms applied to intrusion detection

TL;DR: A prototype intelligent intrusion detection system that combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques is developed.
Proceedings ArticleDOI

Anomaly Based Web Phishing Page Detection

TL;DR: The idea is to examine the anomalies in Web pages, in particular, the discrepancy between a Web site's identity and its structural features and HTTP transactions, which demands neither user expertise nor prior knowledge of the Web site.
Journal ArticleDOI

An antiphishing strategy based on visual similarity assessment

TL;DR: The authors' proposed antiphishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the SiteWatcher system.
Related Papers (5)