[go: up one dir, main page]

Senecal, 2024 - Google Patents

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet

Senecal, 2024

Document ID
16667342506439962480
Author
Senecal D
Publication year

External Links

Snippet

A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student

Similar Documents

Publication Publication Date Title
Robertson et al. Darkweb cyber threat intelligence mining
Chaudhry The looming shadow of illicit trade on the internet
US8826154B2 (en) System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US9384345B2 (en) Providing alternative web content based on website reputation assessment
US8516377B2 (en) Indicating Website reputations during Website manipulation of user information
US7765481B2 (en) Indicating website reputations during an electronic commerce transaction
US7822620B2 (en) Determining website reputations using automatic testing
US8566726B2 (en) Indicating website reputations based on website handling of personal information
Shakarian et al. Exploring malicious hacker forums
US20140331119A1 (en) Indicating website reputations during user interactions
US20060253584A1 (en) Reputation of an entity associated with a content item
Georgoulias et al. Botnet business models, takedown attempts, and the darkweb market: A survey
Wilner et al. On the social science of ransomware: Technology, security, and society
Senecal The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet
Parikh Cloud security and platform thinking: an analysis of Cisco Umbrella, a cloud-delivered enterprise security
Bauer et al. The new cybersecurity agenda: Economic and social challenges to a secure internet
Jakobsson The death of the internet
Acharya et al. The imitation game: Exploring brand impersonation attacks on social media platforms
Frumento et al. The role of Social Engineering in evolution of attacks
Oram et al. Beautiful security: Leading security experts explain how they think
ThreatLab Zscaler threatlabz 2023 phishing report
Frauenstein A framework to mitigate phishing threats
Silva Mitigating botnets: Regulatory solutions for industry intervention in large-scale cybercrime
Farrell Phishing in the financial sector
Sheng A policy analysis of phishing countermeasures