Sonowal, 2021 - Google Patents
What Does a Phishing URL Look Like?Sonowal, 2021
- Document ID
- 14583286283207755826
- Author
- Sonowal G
- Publication year
- Publication venue
- Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
External Links
Snippet
A uniform resource locator (URL) designates a specific Internet resource such as a web page, a text file, a graphics file, or an application program. These are all examples of resources stored on a server. This chapter will show how attackers leverage every part of the …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30876—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
- G06F17/30887—URL specific, e.g. using aliases, detecting broken or misspelled links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Palaniappan et al. | Malicious domain detection using machine learning on domain name features, host-based features and web-based features | |
Jain et al. | A novel approach to protect against phishing attacks at client side using auto-updated white-list | |
Buber et al. | Feature selections for the machine learning based detection of phishing websites | |
Mohammad et al. | An assessment of features related to phishing websites using an automated technique | |
Mohammad et al. | Phishing websites features | |
US8578481B2 (en) | Method and system for determining a probability of entry of a counterfeit domain in a browser | |
KR100935776B1 (en) | Network address evaluation methods, computer readable recording media, computer systems, network address access methods, how to utilize computer infrastructure, and how to perform enterprise network communication traffic analysis | |
US8381276B2 (en) | Safe URL shortening | |
Althobaiti et al. | A review of human-and computer-facing url phishing features | |
US12335305B2 (en) | Systems and methods for detecting domain impersonation | |
US20130263263A1 (en) | Web element spoofing prevention system and method | |
Athulya et al. | Towards the detection of phishing attacks | |
JP7381341B2 (en) | Optimal scanning parameter calculation method, device, and system for malicious URL detection | |
Le Pochat et al. | Funny accents: Exploring genuine interest in internationalized domain names | |
Zeng et al. | A comprehensive measurement study of domain-squatting abuse | |
Ahmad et al. | Overview of phishing landscape and homographs in Arabic domain names | |
Hajiali et al. | Preventing phishing attacks using text and image watermarking | |
Marchal | DNS and semantic analysis for phishing detection | |
Sonowal | What Does a Phishing URL Look Like? | |
JP7138279B1 (en) | Communication system, gateway device, terminal device and program | |
Nourian et al. | CASTLE: A social framework for collaborative anti-phishing databases | |
Quinkert et al. | Digging deeper: An analysis of domain impersonation in the lower DNS hierarchy | |
Hidayat et al. | Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data Theft | |
Saroj et al. | A survey paper on identity theft in the Internet | |
Yaitskyi | Emploging and improving machinelearning of detection of Phishing URLs |