Phishing is another sort of network attack where the attacker creates an imitation of a current site page to trick users into submitting individual, financial related, or password information to what they believe is their service provider's site. The idea is an end-host based anti-phishing algorithm, called the Link Guard, by using the generic attributes of the hyperlinks in phishing attacks. The link Guard algorithm is the idea for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user. Link Guard depends on investigation of the attributes of phishing hyperlinks. Each end user is implemented with Link Guard algorithm. Subsequent to doing as such, the end user perceives the phishing emails and can abstain from responding to such mails. Since Link Guard is qualities based, it can identify and prevent not only known phishing but also obscure ones. Contribution/Originality: This study contributes in the existing literature by introducing an idea in an endhost based anti-phishing algorithm, called the Link Guard and it uses generic attributes of the hyperlinks in phishing attacks. This study uses new estimation methodology for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user. through phisher-controlled proxies used to screen and block consumers' keystrokes). Research has demonstrated that the phishing hyperlinks do not have an indistinguishable attributes from the original one and such differences in the phishing hyperlinks are expressed beneath [2]: i. The visual link and the actual link are not the same. ii. The attackers frequently utilize dotted decimal IP Address rather than DNS name.
Contribution/Originality: This study is one of the very few studies which have investigated security and privacy issues in VANET. We carried out a selective review of published work on this field between 2003 and 2015; and based on our findings, derived a new perspective, and categorized the security attacks on this type of network. 1. INTRODUCTION Vehicular Ad-Hoc Networks (VANETs) is an extension of Mobile Ad-Hoc Networks (MANETs). In Vehicular Ad-hoc Networks (VANETs), wireless-equipped vehicles form a network spontaneously while traveling along the road. Direct wireless transmission from vehicle to vehicle makes it possible to communicate even where there is no telecommunication infrastructure, such as base stations or access points of wireless dedicated access networks; vehicles can share up-to-date traffic information on the fly [1]. This is an emerging new technology to integrate the capabilities of new generation wireless networks to vehicles. The idea is to provide ubiquitous connectivity to vehicular nodes while on the move, and create efficient vehicle-to-vehicle communications that enable the Intelligent Transportation Systems (ITS) [2]. The network is based on node to node communication. A node can either be a user (vehicle) who desires certain information, or a Road Side Unit (RSU). The node, be it vehicles or RSU, can communicate and exchange data for purposes of information inquiry or distribution. The ultimate goal of VANETs is to enhance the driving experience and increase the level of safety for drivers [3-6]. This is achieved by allowing nodes within certain ranges to
The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to the third party, intruder and/or unauthorized person(s). Such scheme will be based on Advanced Encryption Standard (AES) and Neural Data Security (NDS) Model. Based on this background, an AES using Time-based Dynamic Key Generation coupled with NDS model will be used to develop security model for preventing e-commerce related crimes. While AES will secure users’ details in the database server and ensures login authentications, NDS model will fragment or partition sensitive data into High and Low levels of confidentiality. The sensitivity of the data will determine, which category of confidentiality the data will fall into. The fragmented data are saved into two different databases, on two different servers and on the same datacenter. In addition, an exploratory survey was carried out using different performance metrics with different classifications of algorithms. Out of the four algorithms considered, Naive Bayes performs better as it shows, out of a total of 105 instances that were observed, 85.71% were correctly classified while 14.29% were misclassified.
Generally speaking, security has been a major concern in every nook and cranny of our nation -Nigeria. Recently, cases of vandalisation, stolen vehicles, and related issues have been on the increase. The security personnel has done lots of work to curb this menace but most of their actions have not yielded the expected results. Therefore, there is need to use technology to create a safer society. Such technology will use GSM and camera for detections. The technology is not going to replace the security personnel and usage of appliances such as gates, and doors locks, electric wires, etc, but it will be used as an alternative method for prevention/detection. Based on this background, a digital light-dependent resistor (LDR) sensor coupled with a microcontroller, relay, camera, and GSM technology was used to develop a smart home security system for automatic detection. The LDR sensor converts the light intensity to a digital format for the microcontroller to control the security lights automatically by using the relay as a switch. The passive infrared motion sensor perceives human movement and converts it to digital format for the microcontroller to trigger the GSM module and alert the user for live streaming of what is happening on the mobile app by establishing a connection between the camera and android smart device. The capturing and videoing are done on the mobile android device.
According to a UNDP Report (1998), about 54% of Africa’s population is estimated to live in absolute poverty. Currently in Nigeria, rapid change and vigorous development in information technology (IT) is occurring, changing Nigerians’ way of life, as well as the country’s economic strength, national power, and international competitiveness. The status of a country or nation in the global political and economic framework depends on the general rule of the development and progress of IT. With development and innovation going hand in hand and knowledge becoming one of the most important factors in determining standard of living, most advanced economies and companies today are those that play the knowledge card as a tool to drive development. Therefore, in this paper, the authors examine the categories, causes, and effects of poverty and how poverty reduction can be achieved in Nigeria with information technology (IT).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.