[go: up one dir, main page]

Alsiyabi et al., 2021 - Google Patents

AN ENHANCED LOUVAIN CLUSTERING TECHNIQUE FOR THE IMPROVEMENT OF COOKIE POISONING ATTACK IN CYBER SECURITY

Alsiyabi et al., 2021

View PDF
Document ID
6954472869272483772
Author
Alsiyabi M
Oman A
Sudiksa M
Publication year

External Links

Snippet

Recently researchers are very much interested to concentrate the obstacle of cyber security attackers. There are numerous directions and procedures available to attack any organization, application, website and credentials. Several attacks are packet capturing …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]

Similar Documents

Publication Publication Date Title
Kostyuk et al. The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public
US20210377303A1 (en) Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites
US20210377304A1 (en) Machine learning to determine command and control sites
Patil et al. Survey on malicious web pages detection techniques
US8850567B1 (en) Unauthorized URL requests detection
Dupont Skills and trust: a tour inside the hard drives of computer hackers
Singh et al. Taxonomy of attacks on web based applications
Kigerl Routine activity theory and malware, fraud, and spam at the national level
Albulayhi et al. A Comprehensive Study on Privacy and Security on Social Media.
Wilner et al. On the social science of ransomware: Technology, security, and society
EP3965362A1 (en) Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites
Naresh et al. Intelligent phishing website detection and prevention system by using link guard algorithm
Hutchings et al. Configuring Zeus: A case study of online crime target selection and knowledge transmission
P. Velayudhan et al. Compromised account detection in online social networks: A survey
Kshetri et al. A review and analysis of online crime in pre and post COVID scenario with respective counter measures and security strategies
Paturi et al. Detection of phishing attacks using visual similarity model
Hoffman et al. Ajax security
Zaeifi et al. Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
Olayah et al. Online Security on E-CRM System
Alsiyabi et al. AN ENHANCED LOUVAIN CLUSTERING TECHNIQUE FOR THE IMPROVEMENT OF COOKIE POISONING ATTACK IN CYBER SECURITY
Hoseini Ransomware and phishing cyberattacks: analyzing the public’s perception of these attacks in Sweden
Gopan et al. The Intercorrelation between Zero trust, Dark web, and its Implications in the field of Digital Forensics
Sonowal Types of Phishing
Garcia et al. The commonalities in social engineering attacks through e-commerce shopping platforms & online gaming programs
Rahaman The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals