Research Article

Cluster-Based Antiphishing (CAP) Model for Smart Phones

Table 1

Critical review of the literature schemes.

ApproachClassification diagramMechanismContributionLimitationsImplementation scenarioTechnology/algorithms used/tools

Network-level protection [14]IPInternet service providers database is usedAttack detection good, offender address list is up to dateRule tuning, message content not verifiedDNSSnort
Authentication [15]CertificatesUser, domain, e-mail, and transaction based authentication based on digital signatures and hashingLess complexity, no need of inter e-mail domains cooperation, enhance securityVulnerable to man-in-the-middle attacks, technology constraintsHotmail, Yahoo, GmailPGP, S/MIME
Client-side tools [16]URLWhitelisting and blacklistingLegitimate e-mail will be acceptable only, best for already known phishing websitesHigh false positive and false negative rate for white- and blacklisting respectivelyMozilla, Firefox, and Internet Explorer browsersNet craft, eBay toolbar, IE phishing filter
User education [17]Social engineeringOnline material, online test, and contextual trainingAuthority, attractive and impressiveFalse negativeAll scenariosSmart OS
Server-side filters and classifiers [18]Technical maneuversCompare multiple classifiers and clustering techniquesDiscover phishing attacks with narrow earlier knowledgeTime and space tradeoffInternet browsersSupport vector machines