Singh et al., 2018 - Google Patents
A survey on phishing and anti-phishing techniquesSingh et al., 2018
View PDF- Document ID
- 4786771625675798111
- Author
- Singh L
- Imphal N
- Publication year
- Publication venue
- International Journal of Computer Science Trends and Technology (IJCST)
External Links
Snippet
Phishing is one of the major online frauds used to collect personal information illegally through spamming or other deceptive means. It is an online theft of sensitive information that swindles innocent users into disclosing secret information such as user names, passwords …
- 238000000034 method 0 title abstract description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhavsar et al. | Study on phishing attacks | |
US10084791B2 (en) | Evaluating a questionable network communication | |
Banu et al. | A comprehensive study of phishing attacks | |
US9912677B2 (en) | Evaluating a questionable network communication | |
US9674145B2 (en) | Evaluating a questionable network communication | |
Aldawood et al. | An advanced taxonomy for social engineering attacks | |
Milletary et al. | Technical trends in phishing attacks | |
US9015090B2 (en) | Evaluating a questionable network communication | |
EP2147390B1 (en) | Detection of adversaries through collection and correlation of assessments | |
Chanti et al. | A literature review on classification of phishing attacks | |
CA2921345A1 (en) | Evaluating a questionable network communication | |
Chhikara et al. | Phishing & anti-phishing techniques: Case study | |
Singh et al. | A survey on phishing and anti-phishing techniques | |
Lim et al. | Phishing security: Attack, detection, and prevention mechanisms | |
Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
Chaudhary | Development review on phishing: a computer security threat | |
Rawat et al. | An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks | |
Bhati et al. | Prevention approach of phishing on different websites | |
Kaur et al. | A Review on Phishing Technique: Classification, Lifecycle and Detection Approaches | |
Mihai | Overview on phishing attacks | |
Sharma et al. | A Review Of Recent Cyber-Attacks In Fiji | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Andrushchak | Andrushchak I. Ye. Features of the main directions, techniques and methods of protection against fishing at-tacks | |
Rao et al. | Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques | |
Kamal et al. | Security and Privacy Issues in Wireless Networks and Mitigation Methods |