[go: up one dir, main page]

Sonowal, 2021 - Google Patents

What Does a Phishing URL Look Like?

Sonowal, 2021

Document ID
14583286283207755826
Author
Sonowal G
Publication year
Publication venue
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

External Links

Snippet

A uniform resource locator (URL) designates a specific Internet resource such as a web page, a text file, a graphics file, or an application program. These are all examples of resources stored on a server. This chapter will show how attackers leverage every part of the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30876Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
    • G06F17/30887URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/3089Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30899Browsing optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Palaniappan et al. Malicious domain detection using machine learning on domain name features, host-based features and web-based features
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
Buber et al. Feature selections for the machine learning based detection of phishing websites
Mohammad et al. An assessment of features related to phishing websites using an automated technique
Mohammad et al. Phishing websites features
US8578481B2 (en) Method and system for determining a probability of entry of a counterfeit domain in a browser
KR100935776B1 (en) Network address evaluation methods, computer readable recording media, computer systems, network address access methods, how to utilize computer infrastructure, and how to perform enterprise network communication traffic analysis
US8381276B2 (en) Safe URL shortening
Althobaiti et al. A review of human-and computer-facing url phishing features
US12335305B2 (en) Systems and methods for detecting domain impersonation
US20130263263A1 (en) Web element spoofing prevention system and method
Athulya et al. Towards the detection of phishing attacks
JP7381341B2 (en) Optimal scanning parameter calculation method, device, and system for malicious URL detection
Le Pochat et al. Funny accents: Exploring genuine interest in internationalized domain names
Zeng et al. A comprehensive measurement study of domain-squatting abuse
Ahmad et al. Overview of phishing landscape and homographs in Arabic domain names
Hajiali et al. Preventing phishing attacks using text and image watermarking
Marchal DNS and semantic analysis for phishing detection
Sonowal What Does a Phishing URL Look Like?
JP7138279B1 (en) Communication system, gateway device, terminal device and program
Nourian et al. CASTLE: A social framework for collaborative anti-phishing databases
Quinkert et al. Digging deeper: An analysis of domain impersonation in the lower DNS hierarchy
Hidayat et al. Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data Theft
Saroj et al. A survey paper on identity theft in the Internet
Yaitskyi Emploging and improving machinelearning of detection of Phishing URLs