Ali et al., 2015 - Google Patents
An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontologyAli et al., 2015
View PDF- Document ID
- 9949026944666543535
- Author
- Ali M
- Siddiqui O
- Nayeemuddin M
- Rajamani L
- Publication year
- Publication venue
- Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on
External Links
Snippet
Breaches in Cyber Security due to phishing messages is traced from instant messages which are sent through Social Networking Sites (SNS), these breaches lead to disruptions in network communication and theft of personal identifiable information (PII) that leads to a …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Salloum et al. | Phishing email detection using natural language processing techniques: a literature survey | |
Ho et al. | Detecting and characterizing lateral phishing at scale | |
Sahingoz et al. | Machine learning based phishing detection from URLs | |
Khandpur et al. | Crowdsourcing cybersecurity: Cyber attack detection using social media | |
Husari et al. | Using entropy and mutual information to extract threat actions from cyber threat intelligence | |
Vijayalakshmi et al. | Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions | |
Le Sceller et al. | Sonar: Automatic detection of cyber security events over the twitter stream | |
Egele et al. | Towards detecting compromised accounts on social networks | |
Cho et al. | A method of monitoring and detecting APT attacks based on unknown domains | |
Hossain et al. | Machine learning-based phishing attack detection | |
Apte et al. | Frauds in online social networks: A review | |
Tan et al. | Phishing website detection using URL-assisted brand name weighting system | |
Hoang et al. | An improved model for detecting DGA botnets using random forest algorithm | |
Lee et al. | Building robust phishing detection system: an empirical analysis | |
Zhang et al. | Cross-site scripting (XSS) detection integrating evidences in multiple stages | |
Patsakis et al. | Exploiting statistical and structural features for the detection of domain generation algorithms | |
Kumar Birthriya et al. | A comprehensive survey of phishing email detection and protection techniques | |
Nakano et al. | Canary in twitter mine: collecting phishing reports from experts and non-experts | |
Wang et al. | A dictionary-based method for detecting machine-generated domains | |
Ali et al. | Framework for surveillance of instant messages | |
Ali et al. | An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology | |
Ali et al. | ESMD: enhanced suspicious message detection framework in instant messaging applications | |
Rawat et al. | A real time spam classification of twitter data with comparative analysis of classifiers | |
Abhijith et al. | Detection of Malicious URLs in Twitter | |
DeLoach et al. | Twitter-enhanced Android malware detection |