[go: up one dir, main page]

Stephen et al. - Google Patents

ENHANCED ONLINE ANTI PHISHING WITH EGUARD ALGORITHM

Stephen et al.

View PDF
Document ID
1166709912646833640
Author
Stephen M
Rao K

External Links

Snippet

Abstract (fish'ing)(n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity thef. The e-mail directs the user to visit a kleb site …
Continue reading at www.jamesstephen.in (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Chen et al. Online detection and prevention of phishing attacks
US8578480B2 (en) Systems and methods for identifying potentially malicious messages
US8095967B2 (en) Secure web site authentication using web site characteristics, secure user credentials and private browser
US20090089859A1 (en) Method and apparatus for detecting phishing attempts solicited by electronic mail
Van der Merwe et al. Characteristics and responsibilities involved in a phishing attack
Kang et al. Advanced white list approach for preventing access to phishing sites
Naresh et al. Intelligent phishing website detection and prevention system by using link guard algorithm
Hajgude et al. Phish mail guard: Phishing mail detection technique by using textual and URL analysis
Jakobsson The rising threat of launchpad attacks
Suriya et al. An integrated approach to detect phishing mail attacks: A case study
Singh et al. A survey on phishing and anti-phishing techniques
Gautam et al. Phishing prevention techniques: past, present and future
Kumar et al. Email phishing attack mitigation using server side email addon
Bashir et al. The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain
Rawat et al. An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks
Philomina et al. A comparitative study of machine learning models for the detection of Phishing Websites
Dhinakaran et al. Multilayer approach to defend phishing attacks
Stephen et al. ENHANCED ONLINE ANTI PHISHING WITH EGUARD ALGORITHM
Gupta et al. A review study on phishing attack techniques for protecting the attacks
Tchakounté et al. True Request–Fake Response: A New Trend of Spear Phishing Attack
Rahmathulla Phishing Detection and Prevention: A New Approach
Patel Design and Implementation of Heuristic based Phishing detection technique
Oko et al. DEVELOPMENT OF PHISHING SITE DETECTION PLUGIN TO SAFEGUARD ONLINE TRANSCATION SERVICES
Mihai Overview on phishing attacks
Kanthety Prevention of Phishing Attacks using Link-Guard Algorithm