Academic Journals Database
Disseminating quality controlled scientific knowledge

Detecting Phishing Attacks In Purchasing Process Through Proactive Approach

ADD TO MY LIST
 
Author(s): S.Arun | D.Ananda | T.Selvaprabhu | B.Sivakumar | P.Revathi | H.Shine

Journal: Advanced Computing : an International Journal
ISSN 2229-726X

Volume: 3;
Issue: 3;
Start page: 81;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Monitoring | Phishing | Commitments | Scam | Processes.

ABSTRACT
A Monitor is a software system that observes and analyzes the behavior of target system determining the quality of interest such as satisfaction of the target system. In the modern technology business processes are open and distributed which may lead to failure. Therefore monitoring is an important task for the services that comprise these processes. We are going to present a framework for multilevel monitoring of these service systems. The main objective of this project is monitoring the customer who purchases items from Merchant. Phishing is an online scam that attempts to defraud people of their personal information such as credit card or bank account information. We are going to detect, locate and remove the phishing E-mail. The customer details will be stored in web registry. We are going to demonstrate how the online business processes can be implemented with multiple scenarios that include monitoring open service policy commitments.
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Rapperswil
Tango Rapperswil