Cluster-Based Antiphishing (CAP) Model for Smart Phones
Algorithm 1
Phishing attack detection using the CAP algorithm.
//PS: packet size defined in RFC, N: number of packets (date rate) defined in RFC, S: start time of the data communication, E: end time of data communication, C for channel name, M for IRC messenger/IRC name, P for port number.
(1)
Assignment and validating entries/values of the parameters defined
IF S ≥ 0 THEN IF E = 1 THEN ends time of communication ELSE 0, IF C = 1 THEN channel name ELSE 0, IF M = 1 THEN IRC messenger name ELSE0, IF P = 1 THEN port number ELSE 0.