Raphael Olufemi Akinyede , Joseph Adebowale Adelakun (2018). Detection and Prevention of Phishing Attack Using Linkguard Algorithm. Journal of Information, 4(1): 10-23. DOI: 10.18488/journal.104.2018.41.10.23
Phishing is another sort of network attack where the attacker creates an imitation of a current site page to trick users into submitting individual, financial related, or password information to what they believe is their service provider's site. The idea is an end-host based anti-phishing algorithm, called the Link Guard, by using the generic attributes of the hyperlinks in phishing attacks. The link Guard algorithm is the idea for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user. Link Guard depends on investigation of the attributes of phishing hyperlinks. Each end user is implemented with Link Guard algorithm. Subsequent to doing as such, the end user perceives the phishing emails and can abstain from responding to such mails. Since Link Guard is qualities based, it can identify and prevent not only known phishing but also obscure ones.
This study contributes in the existing literature by introducing an idea in an end-host based anti-phishing algorithm, called the Link Guard and it uses generic attributes of the hyperlinks in phishing attacks. This study uses new estimation methodology for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user.
Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
Emmanuel Bamidele Ajulo , Raphael Olufemi Akinyede , Olumide Sunday Adewale (2018). Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective. Journal of Information, 4(1): 1-9. DOI: 10.18488/journal.104.2018.41.1.9
In Vehicular Ad Hoc Networks (VANETs) Wireless-equipped vehicles are able to communicate with each other as well as Road-Side Units (RSUs) located at strategic places on the road, this enables the formation of self-organized networks connecting the vehicles and RSUs. The (vehicles) nodes are fast mobile causing the network topology to change frequently and unpredictably. Since VANETs do not really rely on any form of central administration or control, nodes in the wireless range dynamically discover each other and establish connection with each other. Due to the pervasive nature of the mobile nodes, it cannot be assumed that VANETs will always be under the control of their owners; nodes could be stolen or tampered with. Each vehicle (node) acts as an independent router and fault detection and network management becomes distributed and more difficult. The shared wireless medium is accessible to both legitimate and illegitimate users; and this has raise formidable research challenges to providing security for this network. This paper take a selective review of the published research work carried out in the security and privacy issue of VANET between 2003 and 2015 and derived a new perspective into the security and privacy attacks in VANET.
This study is one of the very few studies which have investigated security and privacy issues in VANET. We carried out a selective review of published work on this field between 2003 and 2015; and based on our findings, derived a new perspective, and categorized the security attacks on this type of network.