Usha et al., 2014 - Google Patents
Phishing-A Challenge in the InternetUsha et al., 2014
- Document ID
- 2747691021730878844
- Author
- Usha M
- Deepika P
- Publication year
- Publication venue
- International Journal of Computer Science and Information Technologies
External Links
- 238000000034 method 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Milletary et al. | Technical trends in phishing attacks | |
Banu et al. | A comprehensive study of phishing attacks | |
Aldawood et al. | An advanced taxonomy for social engineering attacks | |
Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
Damodaram | Study on phishing attacks and antiphishing tools | |
Orman | The compleat story of phish | |
Islam et al. | Phishing attack detecting system using DNS and IP filtering | |
Thaker et al. | Detecting phishing websites using data mining | |
Singh | Detection of Phishing e-mail | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
Mansfield-Devine | Bad behaviour: exploiting human weaknesses | |
Chaudhary | Development review on phishing: a computer security threat | |
Usha et al. | Phishing-A Challenge in the Internet | |
Dhanalakshmi et al. | Detection of phishing websites and secure transactions | |
Rawat et al. | An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks | |
Bhati et al. | Prevention approach of phishing on different websites | |
Khanna et al. | Anatomy of compromising email accounts | |
Domazet | Phishing and pharming attacks aimed at identity theft of internet users | |
Bhardwaj et al. | Types of hacking attack and their countermeasure | |
Mihai | Overview on phishing attacks | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Singh et al. | A literature survey on anti-phishing browser extensions | |
Pac | Phishing threats, attack vectors, and mitigation | |
Metwally et al. | Hacking Human: Hacking the Weakest Link in the Security Chain | |
Mughele | A Review of Phishing Attacks |