[go: up one dir, main page]

Lakshmi et al., 2024 - Google Patents

Advanced Phishing Website Detection Techniques in Internet of Things Using Machine Learning

Lakshmi et al., 2024

Document ID
8432367454738098255
Author
Lakshmi G
Swetha P
Publication year
Publication venue
2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC)

External Links

Snippet

There is a serious risk to information privacy and security in the Internet of Things (IoT) ecosystem from phishing attacks. Phishing assaults are futile attempts to fool people into disclosing their login credentials or infecting the beacon's computer with malware. This …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
US20240089285A1 (en) Automated responsive message to determine a security risk of a message sender
US12261883B2 (en) Detecting phishing attempts
US11102244B1 (en) Automated intelligence gathering
Ho et al. Detecting and characterizing lateral phishing at scale
US11403400B2 (en) Troll account detection
US11418527B2 (en) Malicious social media account identification
US11394722B2 (en) Social media rule engine
US20210312395A1 (en) System and Method for Using Human Relationship Structures for Email Classification
US20190058721A1 (en) Social threat correlation
Shin et al. Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix
US20190036937A1 (en) Social network page protection
Hajgude et al. Phish mail guard: Phishing mail detection technique by using textual and URL analysis
Patil et al. Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm
US10868824B2 (en) Organizational social threat reporting
Wood et al. Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection
Almousa et al. Anti-Spoofing in Medical Employee's Email using Machine Learning Uclassify Algorithm
Seth et al. A comprehensive study of classification of phishing attacks with its AI/I detection
Lakshmi et al. Advanced Phishing Website Detection Techniques in Internet of Things Using Machine Learning
Chaudhary Development review on phishing: a computer security threat
Adewumi et al. Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation
Rahaman The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals
Arya et al. Multi layer detection framework for spear-phishing attacks
Ahmed Toward Eradication of Phishing Attacks in E-government Systems
Patel Design and Implementation of Heuristic based Phishing detection technique