Research Article

Cluster-Based Antiphishing (CAP) Model for Smart Phones

Algorithm 1

Phishing attack detection using the CAP algorithm.
//PS: packet size defined in RFC, N: number of packets (date rate) defined in RFC, S: start time of the data communication, E: end time of data communication, C for channel name, M for IRC messenger/IRC name, P for port number.
(1)Assignment and validating entries/values of the parameters defined
IF S ≥ 0 THEN IF E = 1 THEN ends time of communication ELSE 0, IF C = 1 THEN channel name ELSE 0, IF M = 1 THEN IRC messenger name ELSE0, IF P = 1 THEN port number ELSE 0.
(2)
(3)
(4)
(5) then