[go: up one dir, main page]

Usha et al., 2014 - Google Patents

Phishing-A Challenge in the Internet

Usha et al., 2014

Document ID
2747691021730878844
Author
Usha M
Deepika P
Publication year
Publication venue
International Journal of Computer Science and Information Technologies

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles

Similar Documents

Publication Publication Date Title
Milletary et al. Technical trends in phishing attacks
Banu et al. A comprehensive study of phishing attacks
Aldawood et al. An advanced taxonomy for social engineering attacks
Nagunwa Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors
Damodaram Study on phishing attacks and antiphishing tools
Orman The compleat story of phish
Islam et al. Phishing attack detecting system using DNS and IP filtering
Thaker et al. Detecting phishing websites using data mining
Singh Detection of Phishing e-mail
Teichmann et al. Phishing attacks: risks and challenges for law firms
Mansfield-Devine Bad behaviour: exploiting human weaknesses
Chaudhary Development review on phishing: a computer security threat
Usha et al. Phishing-A Challenge in the Internet
Dhanalakshmi et al. Detection of phishing websites and secure transactions
Rawat et al. An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks
Bhati et al. Prevention approach of phishing on different websites
Khanna et al. Anatomy of compromising email accounts
Domazet Phishing and pharming attacks aimed at identity theft of internet users
Bhardwaj et al. Types of hacking attack and their countermeasure
Mihai Overview on phishing attacks
Mehendele et al. Review of Phishing Attacks and Anti Phishing Tools
Singh et al. A literature survey on anti-phishing browser extensions
Pac Phishing threats, attack vectors, and mitigation
Metwally et al. Hacking Human: Hacking the Weakest Link in the Security Chain
Mughele A Review of Phishing Attacks