+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

  • Type:Project
  • Chapters:5
  • Pages:30
  • Methodology:Nil
  • Reference:YES
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)

ABSTRACT
Anti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and overall styles. The approach is designed to be part of an enterprise anti-phishing solution.


TABLE OF CONTENT
TITLE PAGE                                   
CERTIFICATION                               
APPROVAL                               
DEDICATION                                   
ACKNOWLEDGEMENT                       
ABSTRACT                                   
TABLE OF CONTENT               
                
CHAPTER ONE
1.0    INTRODUCTION                           
1.1    STATEMENT OF PROBLEM                       
1.2    PURPOSE OF STUDY                           
1.3    AIMS AND OBJECTIVES                        
1.4    SCOPE/DELIMITATIONS                       
1.5    LIMITATIONS/CONSTRAINTS                       
1.6    DEFINITION OF TERMS 
                      
CHAPTER TWO
2.0    LITERATURE REVIEW        
                   
CHAPTER THREE
3.0    METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1     METHODOLOGIES FOR FACT-FINDING
3.2    DISCUSSIONS       
     
CHAPTER FOUR
4.0    FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1    FUTURES
4.2    IMPLICATIONS
4.3    CHALLENGES

CHAPTER FIVE
5.0    RECOMMENDATIONS, SUMMARY AND CONCLUSION       
5.1    RECOMMENDATION                           
5.2    SUMMARY                               
5.3    CONCLUSION                               
5.4    REFERENCES                       
CHAPTER ONE
1.0 INTRODUCTION
Phishing attacks are increasing in frequency and sophistication. The Anti- Phishing Working Group (APWG; www.antiphishing.org) recently reported that the number of attacks is growing by 50 percent per month, with roughly 5 percent of recipients falling victim to them. Phishing Web pages generally use similar page layouts, styles (font families, sizes, and so on), key regions, and blocks to mimic genuine pages in an effort to convince Internet users to divulge personal information, such as bank account numbers and passwords
1.1STATEMENT OF PROBLEM
Pin code numbers that are available in the nation today is not enough to serve the teaming population and among the available line, many are faulty because of lack of maintenance. Our government is not given enough funds to MTN management.
MTN is crying daily for insufficient line, but with all this more than one line are allocated to some individuals 
The Network of MTN cabinets are no longer useful and the under-ground cable system is no more serving the population currently in the society.
MTN is finding it difficult to maintain the identity and record of its subscribers, this makes it impossible for them to know the people line are allocated to and those people pin code numbers are not allocated to.
1.2 PURPOSE OF STUDY
The main aim of this study is to computerize XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks system in order to improve their transaction rate of services to their various customers.
.
1.3 AIMS AND OBJECTIVES
1. The present invention is to provide a method and system for generating a number stream that, using the most advanced cryptanalytic and statistical methods available.
2. To provide a method and system for generating an asynchronous pin code number which is non-deterministic?
3. The present invention is to provide a method and system for guaranteeing that no particular subsequence of an asynchronous pin code number or derivative value is used twice while at the same time eliminating vulnerabilities associated with keeping records of values generated.
4. To provide a method and system for generating an asynchronous pin code number which is immune to attack and compromise.
5. To provide a method and system for generating an asynchronous pin code number which utilizes the apparently automatic nature of ordered systems generally?
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has speed up the assigning of number to both individuals. It has helped many organizations to easy the heavy burden associated with manual method of assigning number to their clients. It has helped in the generation, processing and storing of effective and reliable numbers.     

1.4 SCOPE/DELIMITATIONS
The research is for Ad-Hoc Networks as it is maintained with MTN Nigeria . It critically studies the current system in use defecting the problem facing the system, analysis of the problem and coming up with a modified system that well solve the current and further problem that may come up with little or no modification. This will do a lot of good. 
1.5 LIMITATIONS/CONSTRAINTS
Our time and money was our major physical problem during the course of the project work. (or should I say my time and money) with my studies and exams at hand I just have limited time to carryout this research very extensively. However, I did a detailed research work.

1.6 DEFINITION OF TERMS
Asynchronous relating to or using an electronic communication method that sends data in one direction, one character at a time
COMPUTER is an electronic device used for to accept data inform of input and process the data, store the data and has the ability to retrieve stored data.
HARDWARE is the physical component of computer
SYSTEM is the collection of all part of computer including human being.
STAFF is the person working in an organization.
STORAGE is a media for storing data/information.
DATABASE is the collection of related files.
Telephone is an instrument that sends and receives voice messages and data. 
Telephone call a communication carried out using the telephone
Telephone booth an enclosed or partly enclosed space with a pay telephone in it
Telephone number the sequence of numbers that identifies a particular telephone and that must be dialed for a caller to be connected to it
6.                 Hardware: This is the electromechanical part of computer system. 
7.                 Information: This is data that have been processed, interpreted and understood by the recipient of the message or report. 
8.                 Internet is a collection of computer networks that operate to common standards and enable the computes and the prog re-ram they run to communicate directly. 
9.                 Server: This is a process that provides requested services for clients. 
10. Software: This is a logically written program that hardware uses to perform it’s operation. 
11. System is the collection of hardware, software, data information, procedures and people.
12. Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet.

AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

Share This

Details

Type Project
Department Computer Science
Project ID CPU1403
Price ₦3,000 ($9)
Chapters 5 Chapters
No of Pages 30 Pages
Methodology Nil
Reference YES
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1403
    Price ₦3,000 ($9)
    Chapters 5 Chapters
    No of Pages 30 Pages
    Methodology Nil
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT INTERNET: As global connection of computers sited around the world forming huge network for information to be shared and disseminated by many millions of people has done so well in information Technology and in education so to speak. Since the introduction of Value Added Network certain events... Continue Reading
    VISUAL CLASSROOM AND TEXT BASED E- LEARNING ABSTRACT INTERNET: As global connection of computers sited around the world forming huge network for information to be shared and disseminated by many millions of people has done so well in information Technology and in education so to speak. Since the introduction of Value Added Network certain events... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1 Background of the Study One of the major problems confronting the developing countries in the process of development is the management of rapid deterioration and change in the urban areas. These changes if not well managed will impact on visual... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1       BACKGROUND OF THE STUDY             Nigeria has become a country playing host to the victory of wrong over light, falsehood over the truth and supremacy of personal irresponsibility over fundamental values. It is a country... Continue Reading
    INTRODUCTION 1.1 BACKGROUND OF THE STUDY Nigeria has become a country playing host to the victory of wrong over light, falsehood over the truth and supremacy of personal irresponsibility over fundamental values. It is a country perpetuating a policy that fails to value human life and cherish human beings above material possession, power and... Continue Reading
    ASSESSMENT OF THE ROLE OF THE MEDIA IN ANTI – CORRUPTION CAMPAGIN CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Nigeria has become a country playing host to the victory of wrong over light, falsehood over the truth and supremacy of personal irresponsibility over fundamental values. It is a country perpetuating a policy that fails to value... Continue Reading
     CHAPTER ONE INTRODUCTION 1.1     BACKGROUND OF THE STUDY           Nigeria has become a country playing host to the victory of wrong over light, falsehood over the truth and supremacy of personal irresponsibility over fundamental values. It is a country perpetuating... Continue Reading
    ASSESSMENT OF THE ROLE OF THE MEDIA IN ANTI – CORRUPTION CAMPAGIN CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Nigeria has become a country playing host to the victory of wrong over light, falsehood over the truth and supremacy of personal irresponsibility over fundamental values. It is a country perpetuating a policy that fails to value... Continue Reading
    INTRODUCTION 1.1   Background of the Study Corruption has destroyed the basic concept of the Rule of Law in Nigeria. In Nigeria the law has lost much of its operational force as people breach the law with impunity. The concept of the... Continue Reading
    A CASE STUDY OF NIGERIAN BOTTLING COMPANY PLC ABSTRACT The competitive nature of the economy, cause many products and services to lose their distinctiveness, the competitors’ offering of lower prices, and the deteriorating public perception of the business organizations have called... Continue Reading