[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ali et al., 2015 - Google Patents

An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology

Ali et al., 2015

View PDF
Document ID
9949026944666543535
Author
Ali M
Siddiqui O
Nayeemuddin M
Rajamani L
Publication year
Publication venue
Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on

External Links

Snippet

Breaches in Cyber Security due to phishing messages is traced from instant messages which are sent through Social Networking Sites (SNS), these breaches lead to disruptions in network communication and theft of personal identifiable information (PII) that leads to a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Salloum et al. Phishing email detection using natural language processing techniques: a literature survey
Ho et al. Detecting and characterizing lateral phishing at scale
Sahingoz et al. Machine learning based phishing detection from URLs
Khandpur et al. Crowdsourcing cybersecurity: Cyber attack detection using social media
Husari et al. Using entropy and mutual information to extract threat actions from cyber threat intelligence
Vijayalakshmi et al. Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions
Le Sceller et al. Sonar: Automatic detection of cyber security events over the twitter stream
Egele et al. Towards detecting compromised accounts on social networks
Cho et al. A method of monitoring and detecting APT attacks based on unknown domains
Hossain et al. Machine learning-based phishing attack detection
Apte et al. Frauds in online social networks: A review
Tan et al. Phishing website detection using URL-assisted brand name weighting system
Hoang et al. An improved model for detecting DGA botnets using random forest algorithm
Lee et al. Building robust phishing detection system: an empirical analysis
Zhang et al. Cross-site scripting (XSS) detection integrating evidences in multiple stages
Patsakis et al. Exploiting statistical and structural features for the detection of domain generation algorithms
Kumar Birthriya et al. A comprehensive survey of phishing email detection and protection techniques
Nakano et al. Canary in twitter mine: collecting phishing reports from experts and non-experts
Wang et al. A dictionary-based method for detecting machine-generated domains
Ali et al. Framework for surveillance of instant messages
Ali et al. An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology
Ali et al. ESMD: enhanced suspicious message detection framework in instant messaging applications
Rawat et al. A real time spam classification of twitter data with comparative analysis of classifiers
Abhijith et al. Detection of Malicious URLs in Twitter
DeLoach et al. Twitter-enhanced Android malware detection