Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Journal of Information

March 2018, Volume 4, 1, pp 10-23

Detection and Prevention of Phishing Attack Using Linkguard Algorithm

Raphael Olufemi Akinyede


Joseph Adebowale Adelakun

Raphael Olufemi Akinyede 1 ,

Joseph Adebowale Adelakun 1 
  1. Department of Computer Science, The Federal University of Technology, Akure, Ondo State, Nigeria 1

Pages: 10-23

DOI: 10.18488/journal.104.2018.41.10.23

Share :

Article History:

Received: 21 May, 2018

Accepted: 10 July, 2018
Published: 17 July, 2018


Phishing is another sort of network attack where the attacker creates an imitation of a current site page to trick users into submitting individual, financial related, or password information to what they believe is their service provider's site. The idea is an end-host based anti-phishing algorithm, called the Link Guard, by using the generic attributes of the hyperlinks in phishing attacks. The link Guard algorithm is the idea for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user. Link Guard depends on investigation of the attributes of phishing hyperlinks. Each end user is implemented with Link Guard algorithm. Subsequent to doing as such, the end user perceives the phishing emails and can abstain from responding to such mails. Since Link Guard is qualities based, it can identify and prevent not only known phishing but also obscure ones.
Contribution/ Originality
This study contributes in the existing literature by introducing an idea in an end-host based anti-phishing algorithm, called the Link Guard and it uses generic attributes of the hyperlinks in phishing attacks. This study uses new estimation methodology for finding the phishing electronic messages sent by the phisher to get hold on the data of the end user.


Link Guard algorithm, Network security, Phishing, Anti-phishing, Algorithm, Attacks.




Google Scholor ideas Microsoft Academic Search bing Google Scholor


This study received no specific financial support.

Competing Interests:

The authors declare that they have no competing interests.


Our thanks goes to the head of the Department of Computer Sciences and the School of Computing, The Federal University of Technology, Akure, Nigeria for providing a space and facilities during the process of the research. We also appreciate our Postgraduate Student, Mr. Owolawi, L. O. who did most of the experiment as part of his postgraduate diploma work.

Related Article

( 1 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 2 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 3 ) Classification Ensemble Based Anomaly Detection in Network Traffic
( 4 ) Smart Feature Fusion and Model for Human Detection
( 5 ) Detection of Crossed Walls Security Alarm System against Invasion
( 6 ) Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection
( 10 ) Analysis of Cyber Attacks on Load Frequency Control in Smart Grid
( 11 ) Investigate of Mechanical Fuse in Cardan Shaft Using FEM
( 12 ) Vlsi Architecture of Mimo Detector Using Fixed Complexity Sphere Decoding
( 13 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 14 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 15 ) A Detailed Analysis of Software Cost Estimation Using Cosmic-FFP
( 16 ) Received Signal Strength in a Macrocell in Lagos Environs Using Finite Element Method
( 17 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 18 ) Lossless Image Compression and Decompression to Improve the PSNR and MSE Values Using Architecture
( 19 ) PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
( 20 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 22 ) A Survey on Efficient Power Management Using Smart Socket and IoT
( 23 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 24 ) Network Traffic Analysis Using Queuing Model and Regression Technique
( 25 ) Stability Analysis of Type-2 Fuzzy Process Control Using LMI
( 26 ) Intensive Patient Monitoring Using LabVIEW
( 27 ) Quality Assessment and Monitoring of Networks Using Passive Technique
( 28 ) An Overview of Advances in Image Colorization Using Computer Vision and Deep Learning Techniques
( 29 ) Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio
( 30 ) Real-Time Car Parking System Using Arduino Control
( 31 ) Automatic Gas Leakage Monitoring System Using MQ-5 Sensor
( 35 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 36 ) Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique