Lakshmi et al., 2024 - Google Patents
Advanced Phishing Website Detection Techniques in Internet of Things Using Machine LearningLakshmi et al., 2024
- Document ID
- 8432367454738098255
- Author
- Lakshmi G
- Swetha P
- Publication year
- Publication venue
- 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC)
External Links
Snippet
There is a serious risk to information privacy and security in the Internet of Things (IoT) ecosystem from phishing attacks. Phishing assaults are futile attempts to fool people into disclosing their login credentials or infecting the beacon's computer with malware. This …
- 238000001514 detection method 0 title abstract description 46
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
US20240089285A1 (en) | Automated responsive message to determine a security risk of a message sender | |
US12261883B2 (en) | Detecting phishing attempts | |
US11102244B1 (en) | Automated intelligence gathering | |
Ho et al. | Detecting and characterizing lateral phishing at scale | |
US11403400B2 (en) | Troll account detection | |
US11418527B2 (en) | Malicious social media account identification | |
US11394722B2 (en) | Social media rule engine | |
US20210312395A1 (en) | System and Method for Using Human Relationship Structures for Email Classification | |
US20190058721A1 (en) | Social threat correlation | |
Shin et al. | Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix | |
US20190036937A1 (en) | Social network page protection | |
Hajgude et al. | Phish mail guard: Phishing mail detection technique by using textual and URL analysis | |
Patil et al. | Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm | |
US10868824B2 (en) | Organizational social threat reporting | |
Wood et al. | Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection | |
Almousa et al. | Anti-Spoofing in Medical Employee's Email using Machine Learning Uclassify Algorithm | |
Seth et al. | A comprehensive study of classification of phishing attacks with its AI/I detection | |
Lakshmi et al. | Advanced Phishing Website Detection Techniques in Internet of Things Using Machine Learning | |
Chaudhary | Development review on phishing: a computer security threat | |
Adewumi et al. | Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation | |
Rahaman | The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals | |
Arya et al. | Multi layer detection framework for spear-phishing attacks | |
Ahmed | Toward Eradication of Phishing Attacks in E-government Systems | |
Patel | Design and Implementation of Heuristic based Phishing detection technique |