[go: up one dir, main page]

Kalla et al., 2023 - Google Patents

Phishing detection implementation using databricks and artificial Intelligence

Kalla et al., 2023

View PDF
Document ID
2495915975216919817
Author
Kalla D
Samaah F
Kuraku S
Smith N
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

Phishing is a fraudulent activity that includes tricking people into disclosing personal or financial information by impersonating a legitimate company or individual. The increasingly complex nature of phishing has drawn the attention of criminals, who see it as a profitable …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Perwej et al. A systematic literature review on the cyber security
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Kathrine et al. Variants of phishing attacks and their detection techniques
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Mousa et al. Applying risk analysis for determining threats and countermeasures in workstation domain
Osuagwu et al. Mitigating social engineering for improved cybersecurity
Kaur et al. Cybersecurity threats in FinTech
Altwairqi et al. Four most famous cyber attacks for financial gains
Alghenaim et al. Phishing attack types and mitigation: A survey
Kothamasu et al. An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures.
Karie et al. Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats
Guvçi et al. An improved protection approach for protecting from ransomware attacks
Hossain et al. Classifying cyberattacks on financial organizations based on publicly available deep web dataset
Gupta et al. A CANVASS on cyber security attacks and countermeasures
Fadli et al. Cyber attack awareness and prevention in network security
Awan et al. A user friendly security framework for the protection of confidential information
Calder Cyber Security: Essential principles to secure your organisation
Teichmann et al. Phishing attacks: risks and challenges for law firms
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Abid An Analysis of Phishing Attacks: Information Technology Security: Cybercrime and Its Solutions
Muhammad et al. Information protection of end users on the web: privacy issues and measures
Adeel et al. Measuring the implications of email viruses through a unified model of cyber security
Vakil et al. Cyber Attacks: Detection and Prevention
Al Qwaid Cybersecurity Threats: Ransomware, Phishing, and Social Engineering
Algabri AI and Cybersecurity-Innovations in Threat Detection and Prevention