[go: up one dir, main page]

Kim et al., 2019 - Google Patents

Scam detection assistant: Automated protection from scammers

Kim et al., 2019

View PDF
Document ID
16122099344987388107
Author
Kim M
Song C
Kim H
Park D
Kwon Y
Namkung E
Harris I
Carlsson M
Publication year
Publication venue
2019 first international conference on societal automation (SA)

External Links

Snippet

Scams, also known as social engineering attacks, are an extremely common and dangerous threat today. Scams typically result in financial loss by convincing a victim to perform an ill- advised action such as sending money, or convincing him to provide private information. In …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5885Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities

Similar Documents

Publication Publication Date Title
US11818164B2 (en) System and method for omnichannel social engineering attack avoidance
Thakur et al. Innovations of phishing defense: The mechanism, measurement and defense strategies
US10277590B2 (en) Cognitive intelligence based voice authentication
JP7466711B2 (en) System and method for using relationship structures for email classification - Patents.com
Bera et al. Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions
Bhakta et al. Semantic analysis of dialogs to detect social engineering attacks
Tsinganos et al. Towards an automated recognition system for chat-based social engineering attacks in enterprise environments
US10291629B2 (en) Cognitive detection of malicious documents
US11651080B2 (en) Sentiment analysis for securing computer code
Gogoi et al. Phishing and Fraudulent Email Detection through Transfer Learning using pretrained transformer models
CN118194131A (en) Information identification method, apparatus, device, storage medium, and program product
Kim et al. Scam detection assistant: Automated protection from scammers
Nguyen et al. Utilizing large language models with human feedback integration for generating dedicated warning for phishing emails
US20250307457A1 (en) Generative Artificial Intelligence Model Personally Identifiable Information Detection and Protection
Vorobeva et al. Detection of business email compromise attacks with writing style analysis
Canelón et al. Unstructured data for cybersecurity and internal control
Lopez et al. Social engineering detection using natural language processing and machine learning
Kim et al. Catch me, yes we can!-pwning social engineers using natural language processing techniques in real-time
EP4120625B1 (en) System, device and method for detecting social engineering attacks in digital communications
Tsikerdekis et al. Detecting online content deception
Park Text-based phishing detection using a simulation model
Ogala et al. Detecting Telecoms Fraud in a Cloud-Based Environment by Analyzing the Content of a Phone Conversation
El Karhani et al. Phishing and Smishing Detection Using Machine Learning
Alhindi et al. Preventing Data Loss by Harnessing Semantic Similarity and Relevance.
Abdeen et al. VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification