Stephen et al. - Google Patents
ENHANCED ONLINE ANTI PHISHING WITH EGUARD ALGORITHMStephen et al.
View PDF- Document ID
- 1166709912646833640
- Author
- Stephen M
- Rao K
External Links
Snippet
Abstract (fish'ing)(n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity thef. The e-mail directs the user to visit a kleb site …
- 238000002474 experimental method 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Online detection and prevention of phishing attacks | |
US8578480B2 (en) | Systems and methods for identifying potentially malicious messages | |
US8095967B2 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
US20090089859A1 (en) | Method and apparatus for detecting phishing attempts solicited by electronic mail | |
Van der Merwe et al. | Characteristics and responsibilities involved in a phishing attack | |
Kang et al. | Advanced white list approach for preventing access to phishing sites | |
Naresh et al. | Intelligent phishing website detection and prevention system by using link guard algorithm | |
Hajgude et al. | Phish mail guard: Phishing mail detection technique by using textual and URL analysis | |
Jakobsson | The rising threat of launchpad attacks | |
Suriya et al. | An integrated approach to detect phishing mail attacks: A case study | |
Singh et al. | A survey on phishing and anti-phishing techniques | |
Gautam et al. | Phishing prevention techniques: past, present and future | |
Kumar et al. | Email phishing attack mitigation using server side email addon | |
Bashir et al. | The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain | |
Rawat et al. | An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks | |
Philomina et al. | A comparitative study of machine learning models for the detection of Phishing Websites | |
Dhinakaran et al. | Multilayer approach to defend phishing attacks | |
Stephen et al. | ENHANCED ONLINE ANTI PHISHING WITH EGUARD ALGORITHM | |
Gupta et al. | A review study on phishing attack techniques for protecting the attacks | |
Tchakounté et al. | True Request–Fake Response: A New Trend of Spear Phishing Attack | |
Rahmathulla | Phishing Detection and Prevention: A New Approach | |
Patel | Design and Implementation of Heuristic based Phishing detection technique | |
Oko et al. | DEVELOPMENT OF PHISHING SITE DETECTION PLUGIN TO SAFEGUARD ONLINE TRANSCATION SERVICES | |
Mihai | Overview on phishing attacks | |
Kanthety | Prevention of Phishing Attacks using Link-Guard Algorithm |