Naresh et al., 2013 - Google Patents
Intelligent phishing website detection and prevention system by using link guard algorithmNaresh et al., 2013
View PDF- Document ID
- 4390256786875462393
- Author
- Naresh U
- Sagar U
- Reddy C
- Publication year
- Publication venue
- IOSR Journal of Computer Engineering
External Links
Snippet
Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (eg, by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides' …
- 238000001514 detection method 0 title description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Online detection and prevention of phishing attacks | |
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
US8095967B2 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
Patil et al. | Survey on malicious web pages detection techniques | |
Shekokar et al. | An ideal approach for detection and prevention of phishing attacks | |
US20090089859A1 (en) | Method and apparatus for detecting phishing attempts solicited by electronic mail | |
Athulya et al. | Towards the detection of phishing attacks | |
Naresh et al. | Intelligent phishing website detection and prevention system by using link guard algorithm | |
Kang et al. | Advanced white list approach for preventing access to phishing sites | |
Banerjee et al. | SUT: Quantifying and mitigating url typosquatting | |
Waziri | Website forgery: understanding phishing attacks and nontechnical countermeasures | |
Jakobsson | The rising threat of launchpad attacks | |
Singh et al. | An Innovative URL-Based System Approach with ML Based Prevention | |
Singh et al. | A survey on phishing and anti-phishing techniques | |
Olufemi et al. | Detection and prevention of phishing attack using linkguard algorithm | |
Bashir et al. | The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain | |
Bhati et al. | Prevention approach of phishing on different websites | |
Gupta et al. | A review study on phishing attack techniques for protecting the attacks | |
Patel | Design and Implementation of Heuristic based Phishing detection technique | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Usha et al. | Phishing-A Challenge in the Internet | |
Mihai | Overview on phishing attacks | |
Stephen et al. | ENHANCED ONLINE ANTI PHISHING WITH EGUARD ALGORITHM | |
Rahmathulla | Phishing Detection and Prevention: A New Approach | |
Oko et al. | DEVELOPMENT OF PHISHING SITE DETECTION PLUGIN TO SAFEGUARD ONLINE TRANSCATION SERVICES |