Open Access Open Access  Restricted Access Subscription Access

An Eccentric Approach For Spoofing Bother Detection

C. A. Kannadasan, R. Jayakumar



Spoofing is a special type of network bother where the bother creates a replica of an existing web page to fool users into submitting personal, financial, or password data to what they think is their service provider’s web site. T

his proposed work is to find a new anti-spoofing algorithm for LGA (link guard) and DSA, which is filtering the spoofing characters in the websites of the hyperlinks in spoofing bothers. These characteristics are derived by analyzing the spoofing data archive provided by the anti-spoofing working group (APWG). The security mechanisms are primarily based on cryptographic algorithms like link guard algorithm, DSA (Data Shield Algorithm) for detecting spoofing bothers. Generally, the logical conclusion is to use both kinds of algorithms and their combinations to achieve optimal speed and security levels. It is hoped that the booklover will have a wider standpoint on sanctuary in general, and better understand how to reduce the spoofing bother s problems. There are different techniques for filtering the suspected link with the actual link of website and e-mails. This is based on the evaluation criteria and to find the each rule. All the suspected links are checked by the techniques of URL, domain name systems, and to check abnormal pages and to filtering the fake pages. Also check the rules applied for the fake address bar and to produce the all other content methods. It shows that the LGA is better than the DSA for filtering the spoofing bother s websites and e-mail contents. Time and accuracy is also feasible for LGA being better than DSA. 

Keywords: DSA, LGA, Spoofing

Cite this Article

Kannadasan CA, Jayakumar R. An Eccentric Approach for Spoofing Bother Detection. Journal of Advances in Shell Programming. 2017; 4(2): 5–9p.

Full Text:



  • There are currently no refbacks.

This site has been shifted to