Research Article

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Table 7

Pharming attack detection algorithm.

Algorithm 4. Pharming attack detection

/ T set of packets /
/ C set of APChain fields /
ā€‰
Function Behavioral_Profiling (T):
while (not stop condition) do
for T is not null do
if then
if then
/ Analysis of connections to websites suspected as
pharming and connections to a specific target
IP address /
return pharming
ā€‰
Function n-gram(C):
if then
/ Accuracy is increased using the n-gram algorithm /
return true