Uda, 2011 - Google Patents
Protocol and method for preventing attacks from the webUda, 2011
View PDF- Document ID
- 13243306392981243628
- Author
- Uda R
- Publication year
- Publication venue
- World Academy of Science, Engineering and Technology
External Links
Snippet
Nowadays, computer worms, viruses and Trojan horse become popular, and they are collectively called malware. Those malware just spoiled computers by deleting or rewriting important files a decade ago. However, recent malware seems to be born to earn money …
- 241000700605 Viruses 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuraku et al. | Emotet malware a banking credentials stealer | |
Hachem et al. | Botnets: lifecycle and taxonomy | |
US9900346B2 (en) | Identification of and countermeasures against forged websites | |
US9942250B2 (en) | Network appliance for dynamic protection from risky network activities | |
Jackson et al. | Forcehttps: protecting high-security web sites from network attacks | |
Kartaltepe et al. | Social network-based botnet command-and-control: emerging threats and countermeasures | |
Kirda et al. | Client-side cross-site scripting protection | |
US20210014245A1 (en) | In-stream malware protection | |
JP4405248B2 (en) | Communication relay device, communication relay method, and program | |
US20150082424A1 (en) | Active Web Content Whitelisting | |
US20080222736A1 (en) | Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks | |
Villeneuve et al. | Detecting apt activity with network traffic analysis | |
Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
Grossman | Cross-site scripting worms and viruses | |
Emigh | The crimeware landscape: Malware, phishing, identity theft and beyond | |
Sharif | Web attacks analysis and mitigation techniques | |
Leavitt | Instant messaging: a new target for hackers | |
Gyányi | Security Implications of Computer Botnets | |
O’Sullivan et al. | Defending IoT devices from malware | |
Tselios et al. | Improving Network, Data and Application Security for SMEs | |
US12348560B2 (en) | Detecting phishing PDFs with an image-based deep learning approach | |
Bu et al. | The new era of botnets | |
Yan et al. | Anti‐virus in‐the‐cloud service: are we ready for the security evolution? | |
Uda | Protocol and method for preventing attacks from the web | |
Jogdand et al. | Survey of different IDS using honeytoken based techniques to mitigate cyber threats |