Weber, 2012 - Google Patents
Falling victim: why users are tricked by phishing attacksWeber, 2012
- Document ID
- 6238804225604789024
- Author
- Weber T
- Publication year
- Publication venue
- User Behavior
External Links
- 238000001514 detection method 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Purkait | Phishing counter measures and their effectiveness–literature review | |
Aburrous et al. | Experimental case studies for investigating e-banking phishing techniques and attack strategies | |
Andress | Foundations of information security: a straightforward introduction | |
Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
Sountharrajan et al. | Dynamic recognition of phishing URLs using deep learning techniques | |
Blanco Hache et al. | ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud | |
Bregant et al. | Cybercrime and computer crime | |
Al-Daraiseh et al. | Social networks’ benefits, privacy, and identity theft: KSA case study | |
Wu | Fighting phishing at the user interface | |
Jakobsson | The death of the internet | |
Brooks et al. | Influence under siege: Safeguarding influencers from cyberthreats | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
David | Fraud, extortion and identity theft | |
Bhadane et al. | STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS. | |
Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
Bashir et al. | The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain | |
Gautam et al. | Phishing prevention techniques: past, present and future | |
Medlin et al. | The cost of electronic retailing: Prevalent security threats and their results | |
Jaishankar | Identity related Crime in the Cyberspace: Examining Phishing and its impact | |
Shaw | Why phishing works and the detection needed to prevent it | |
Weber | Falling victim: why users are tricked by phishing attacks | |
Sabadash et al. | Methods and Means of Identifying Fraudulent Websites. | |
Barker | Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career | |
Al-Daeef et al. | A review of client-side toolbars as a user-oriented anti-phishing solution |