[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Choudhary et al., 2018 - Google Patents

Comparative analysis of mobile phishing detection and prevention approaches

Choudhary et al., 2018

Document ID
11054941528983828121
Author
Choudhary N
Jain A
Publication year
Publication venue
Information and Communication Technology for Intelligent Systems (ICTIS 2017)-Volume 1 2

External Links

Snippet

Mobile phones have taken a crucial part in today's transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72522With means for supporting locally a plurality of applications to increase the functionality
    • H04M1/72547With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages
    • H04M1/72552With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages for text messaging, e.g. sms, e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/38Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities

Similar Documents

Publication Publication Date Title
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Kumari et al. Verification and validation techniques for streaming big data analytics in internet of things environment
US11388193B2 (en) Systems and methods for detecting online fraud
US10102372B2 (en) Behavior profiling for malware detection
Sadiq et al. A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0
Choudhary et al. Comparative analysis of mobile phishing detection and prevention approaches
CN110620753A (en) System and method for countering attacks on a user's computing device
Bhardwaj et al. Privacy-aware detection framework to mitigate new-age phishing attacks
Ahmed et al. PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
Chorghe et al. A survey on anti-phishing techniques in mobile phones
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Vadariya et al. A survey on phishing URL detection using artificial intelligence
Shahriar et al. Mobile anti-phishing: Approaches and challenges
Lee et al. A study on realtime detecting smishing on cloud computing environments
Varshney et al. Detecting spying and fraud browser extensions: Short paper
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Muppavaram et al. How safe is your mobile app? mobile app attacks and defense
Guarda et al. The art of phishing
James Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Sheik Abdullah et al. Big Data and Analytics
Khalid et al. Anti-phishing models for mobile application development: a review paper
Gautam et al. Phishing prevention techniques: past, present and future
Raval et al. Cyber-Awareness for Dummies
Arya The Evolution of Phishing Attacks How Machine Learning Keeps Up
Sharma et al. A Review of Anti-phishing Techniques and its Shortcomings