Chouhan et al., 2013 - Google Patents
Anti-phishing Measures and Strategies Against Phishing Attacks-an OverviewChouhan et al., 2013
- Document ID
- 5750286641599748994
- Author
- Chouhan R
- Pardeshi S
- Publication year
- Publication venue
- Invertis Journal of Science & Technology
External Links
- 238000000034 method 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chaudhry et al. | Phishing attacks and defenses | |
| Kirda et al. | Protecting users against phishing attacks with antiphish | |
| Milletary et al. | Technical trends in phishing attacks | |
| Kirda et al. | Protecting users against phishing attacks | |
| Khan | Preventing phishing attacks using one time password and user machine identification | |
| Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
| Chhikara et al. | Phishing & anti-phishing techniques: Case study | |
| Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
| LeMay et al. | The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities | |
| Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
| Deo et al. | Information security-recent attacks in Fiji | |
| Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
| Chaudhary | Development review on phishing: a computer security threat | |
| Rawat et al. | An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks | |
| Bhati et al. | Prevention approach of phishing on different websites | |
| Hegt | Analysis of current and future phishing attacks on internet banking services | |
| Plössl et al. | Protection mechanisms against phishing attacks | |
| Ekawade et al. | Phishing attacks and its preventions | |
| Khanna et al. | Anatomy of compromising email accounts | |
| Bhardwaj et al. | Types of hacking attack and their countermeasure | |
| Al Ogaili et al. | A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies | |
| Chouhan et al. | Anti-phishing Measures and Strategies Against Phishing Attacks-an Overview | |
| Domazet | Phishing and pharming attacks aimed at identity theft of internet users | |
| Mihai | Overview on phishing attacks | |
| Sharma et al. | A Review Of Recent Cyber-Attacks In Fiji |