An Anti Phishing Strategy Based On Visual Similarity Assessment

ProjectStoc - 32 pages 3414 words 1242 views Project Diploma/Degree/Masters Level Computer Science ₦3000 Naira ($7.89 USD)

This is a Premium work, paid access only

Register/Login to Access Full Work


ABSTRACT
Anti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and overall styles. The approach is designed to be part of an enterprise anti-phishing solution.


TABLE OF CONTENT
TITLE PAGE                                   
CERTIFICATION                               
APPROVAL                               
DEDICATION                                   
ACKNOWLEDGEMENT                       
ABSTRACT                                   
TABLE OF CONTENT               
                
CHAPTER ONE
1.0    INTRODUCTION                           
1.1    STATEMENT OF PROBLEM                       
1.2    PURPOSE OF STUDY                           
1.3    AIMS AND OBJECTIVES                        
1.4    SCOPE/DELIMITATIONS                       
1.5    LIMITATIONS/CONSTRAINTS                       
1.6    DEFINITION OF TERMS 
                      
CHAPTER TWO
2.0    LITERATURE REVIEW        
                   
CHAPTER THREE
3.0    METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1     METHODOLOGIES FOR FACT-FINDING
3.2    DISCUSSIONS       
     
CHAPTER FOUR
4.0    FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1    FUTURES
4.2    IMPLICATIONS
4.3    CHALLENGES

CHAPTER FIVE
5.0    RECOMMENDATIONS, SUMMARY AND CONCLUSION       
5.1    RECOMMENDATION                           
5.2    SUMMARY                               
5.3    CONCLUSION                               
5.4    REFERENCES                       

Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes

CITE THIS WORK

(2014, 08). An Anti Phishing Strategy Based On Visual Similarity Assessment.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2750/an-anti-phishing-strategy-based-on-visual-similarity-assessment-6416
"An Anti Phishing Strategy Based On Visual Similarity Assessment." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2750/an-anti-phishing-strategy-based-on-visual-similarity-assessment-6416>.
"An Anti Phishing Strategy Based On Visual Similarity Assessment.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2750/an-anti-phishing-strategy-based-on-visual-similarity-assessment-6416>.
"An Anti Phishing Strategy Based On Visual Similarity Assessment.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2750/an-anti-phishing-strategy-based-on-visual-similarity-assessment-6416.

Connect with Us