+

Chouhan et al., 2013 - Google Patents

Anti-phishing Measures and Strategies Against Phishing Attacks-an Overview

Chouhan et al., 2013

Document ID
5750286641599748994
Author
Chouhan R
Pardeshi S
Publication year
Publication venue
Invertis Journal of Science & Technology

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Chaudhry et al. Phishing attacks and defenses
Kirda et al. Protecting users against phishing attacks with antiphish
Milletary et al. Technical trends in phishing attacks
Kirda et al. Protecting users against phishing attacks
Khan Preventing phishing attacks using one time password and user machine identification
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Chhikara et al. Phishing & anti-phishing techniques: Case study
Bose et al. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
LeMay et al. The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Deo et al. Information security-recent attacks in Fiji
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Chaudhary Development review on phishing: a computer security threat
Rawat et al. An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks
Bhati et al. Prevention approach of phishing on different websites
Hegt Analysis of current and future phishing attacks on internet banking services
Plössl et al. Protection mechanisms against phishing attacks
Ekawade et al. Phishing attacks and its preventions
Khanna et al. Anatomy of compromising email accounts
Bhardwaj et al. Types of hacking attack and their countermeasure
Al Ogaili et al. A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies
Chouhan et al. Anti-phishing Measures and Strategies Against Phishing Attacks-an Overview
Domazet Phishing and pharming attacks aimed at identity theft of internet users
Mihai Overview on phishing attacks
Sharma et al. A Review Of Recent Cyber-Attacks In Fiji
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载