[go: up one dir, main page]

Al-Khater et al., 2020 - Google Patents

Comprehensive review of cybercrime detection techniques

Al-Khater et al., 2020

View PDF
Document ID
3652671952048262712
Author
Al-Khater W
Al-Maadeed S
Ahmed A
Sadiq A
Khan M
Publication year
Publication venue
IEEE access

External Links

Snippet

Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Al-Khater et al. Comprehensive review of cybercrime detection techniques
Mijwil et al. The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Soomro et al. Social Media-Related Cybercrimes and Techniques for Their Prevention.
Sun et al. Data-driven cybersecurity incident prediction: A survey
Hindy et al. A taxonomy of network threats and the effect of current datasets on intrusion detection systems
Alani Big data in cybersecurity: a survey of applications and future trends
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
US10165005B2 (en) System and method providing data-driven user authentication misuse detection
Bhavsar et al. Intrusion detection system using data mining technique: Support vector machine
Chinedu et al. Cybercrime detection and prevention efforts in the last decade: an overview of the possibilities of machine learning models
Veena et al. C SVM classification and KNN techniques for cyber crime detection
Boshmaf et al. Thwarting fake OSN accounts by predicting their victims
Albayati et al. Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
Quezada et al. Real-time bot infection detection system using DNS fingerprinting and machine-learning
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Ispahany et al. Detecting malicious COVID-19 URLs using machine learning techniques
Churcher et al. ur Rehman
Naz et al. A comprehensive survey on social engineering-based attacks on social networks
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Imtiaz et al. Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Dsouza et al. Real time network intrusion detection using machine learning technique
Khan et al. AI-powered detection and mitigation of backdoor attacks on databases server
Bolatbek et al. A framework for detection and mitigation of cyber criminal activities using university networks in Kazakhstan