Alsiyabi et al., 2021 - Google Patents
AN ENHANCED LOUVAIN CLUSTERING TECHNIQUE FOR THE IMPROVEMENT OF COOKIE POISONING ATTACK IN CYBER SECURITYAlsiyabi et al., 2021
View PDF- Document ID
- 6954472869272483772
- Author
- Alsiyabi M
- Oman A
- Sudiksa M
- Publication year
External Links
Snippet
Recently researchers are very much interested to concentrate the obstacle of cyber security attackers. There are numerous directions and procedures available to attack any organization, application, website and credentials. Several attacks are packet capturing …
- 235000014510 cooky 0 title abstract description 101
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kostyuk et al. | The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public | |
US20210377303A1 (en) | Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites | |
US20210377304A1 (en) | Machine learning to determine command and control sites | |
Patil et al. | Survey on malicious web pages detection techniques | |
US8850567B1 (en) | Unauthorized URL requests detection | |
Dupont | Skills and trust: a tour inside the hard drives of computer hackers | |
Singh et al. | Taxonomy of attacks on web based applications | |
Kigerl | Routine activity theory and malware, fraud, and spam at the national level | |
Albulayhi et al. | A Comprehensive Study on Privacy and Security on Social Media. | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
EP3965362A1 (en) | Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites | |
Naresh et al. | Intelligent phishing website detection and prevention system by using link guard algorithm | |
Hutchings et al. | Configuring Zeus: A case study of online crime target selection and knowledge transmission | |
P. Velayudhan et al. | Compromised account detection in online social networks: A survey | |
Kshetri et al. | A review and analysis of online crime in pre and post COVID scenario with respective counter measures and security strategies | |
Paturi et al. | Detection of phishing attacks using visual similarity model | |
Hoffman et al. | Ajax security | |
Zaeifi et al. | Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem | |
Olayah et al. | Online Security on E-CRM System | |
Alsiyabi et al. | AN ENHANCED LOUVAIN CLUSTERING TECHNIQUE FOR THE IMPROVEMENT OF COOKIE POISONING ATTACK IN CYBER SECURITY | |
Hoseini | Ransomware and phishing cyberattacks: analyzing the public’s perception of these attacks in Sweden | |
Gopan et al. | The Intercorrelation between Zero trust, Dark web, and its Implications in the field of Digital Forensics | |
Sonowal | Types of Phishing | |
Garcia et al. | The commonalities in social engineering attacks through e-commerce shopping platforms & online gaming programs | |
Rahaman | The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals |