Kim et al., 2019 - Google Patents
Scam detection assistant: Automated protection from scammersKim et al., 2019
View PDF- Document ID
- 16122099344987388107
- Author
- Kim M
- Song C
- Kim H
- Park D
- Kwon Y
- Namkung E
- Harris I
- Carlsson M
- Publication year
- Publication venue
- 2019 first international conference on societal automation (SA)
External Links
Snippet
Scams, also known as social engineering attacks, are an extremely common and dangerous threat today. Scams typically result in financial loss by convincing a victim to perform an ill- advised action such as sending money, or convincing him to provide private information. In …
- 238000001514 detection method 0 title abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5885—Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818164B2 (en) | System and method for omnichannel social engineering attack avoidance | |
Thakur et al. | Innovations of phishing defense: The mechanism, measurement and defense strategies | |
US10277590B2 (en) | Cognitive intelligence based voice authentication | |
JP7466711B2 (en) | System and method for using relationship structures for email classification - Patents.com | |
Bera et al. | Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions | |
Bhakta et al. | Semantic analysis of dialogs to detect social engineering attacks | |
Tsinganos et al. | Towards an automated recognition system for chat-based social engineering attacks in enterprise environments | |
US10291629B2 (en) | Cognitive detection of malicious documents | |
US11651080B2 (en) | Sentiment analysis for securing computer code | |
Gogoi et al. | Phishing and Fraudulent Email Detection through Transfer Learning using pretrained transformer models | |
CN118194131A (en) | Information identification method, apparatus, device, storage medium, and program product | |
Kim et al. | Scam detection assistant: Automated protection from scammers | |
Nguyen et al. | Utilizing large language models with human feedback integration for generating dedicated warning for phishing emails | |
US20250307457A1 (en) | Generative Artificial Intelligence Model Personally Identifiable Information Detection and Protection | |
Vorobeva et al. | Detection of business email compromise attacks with writing style analysis | |
Canelón et al. | Unstructured data for cybersecurity and internal control | |
Lopez et al. | Social engineering detection using natural language processing and machine learning | |
Kim et al. | Catch me, yes we can!-pwning social engineers using natural language processing techniques in real-time | |
EP4120625B1 (en) | System, device and method for detecting social engineering attacks in digital communications | |
Tsikerdekis et al. | Detecting online content deception | |
Park | Text-based phishing detection using a simulation model | |
Ogala et al. | Detecting Telecoms Fraud in a Cloud-Based Environment by Analyzing the Content of a Phone Conversation | |
El Karhani et al. | Phishing and Smishing Detection Using Machine Learning | |
Alhindi et al. | Preventing Data Loss by Harnessing Semantic Similarity and Relevance. | |
Abdeen et al. | VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification |