Senecal, 2024 - Google Patents
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the InternetSenecal, 2024
- Document ID
- 16667342506439962480
- Author
- Senecal D
- Publication year
External Links
Snippet
A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the …
- 201000009032 substance abuse 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
- G09B7/02—Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Robertson et al. | Darkweb cyber threat intelligence mining | |
Chaudhry | The looming shadow of illicit trade on the internet | |
US8826154B2 (en) | System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface | |
US9384345B2 (en) | Providing alternative web content based on website reputation assessment | |
US8516377B2 (en) | Indicating Website reputations during Website manipulation of user information | |
US7765481B2 (en) | Indicating website reputations during an electronic commerce transaction | |
US7822620B2 (en) | Determining website reputations using automatic testing | |
US8566726B2 (en) | Indicating website reputations based on website handling of personal information | |
Shakarian et al. | Exploring malicious hacker forums | |
US20140331119A1 (en) | Indicating website reputations during user interactions | |
US20060253584A1 (en) | Reputation of an entity associated with a content item | |
Georgoulias et al. | Botnet business models, takedown attempts, and the darkweb market: A survey | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Senecal | The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet | |
Parikh | Cloud security and platform thinking: an analysis of Cisco Umbrella, a cloud-delivered enterprise security | |
Bauer et al. | The new cybersecurity agenda: Economic and social challenges to a secure internet | |
Jakobsson | The death of the internet | |
Acharya et al. | The imitation game: Exploring brand impersonation attacks on social media platforms | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Oram et al. | Beautiful security: Leading security experts explain how they think | |
ThreatLab | Zscaler threatlabz 2023 phishing report | |
Frauenstein | A framework to mitigate phishing threats | |
Silva | Mitigating botnets: Regulatory solutions for industry intervention in large-scale cybercrime | |
Farrell | Phishing in the financial sector | |
Sheng | A policy analysis of phishing countermeasures |