Choudhary et al., 2018 - Google Patents
Comparative analysis of mobile phishing detection and prevention approachesChoudhary et al., 2018
- Document ID
- 11054941528983828121
- Author
- Choudhary N
- Jain A
- Publication year
- Publication venue
- Information and Communication Technology for Intelligent Systems (ICTIS 2017)-Volume 1 2
External Links
Snippet
Mobile phones have taken a crucial part in today's transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of …
- 238000001514 detection method 0 title abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
- H04M1/72547—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages
- H04M1/72552—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages for text messaging, e.g. sms, e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Kumari et al. | Verification and validation techniques for streaming big data analytics in internet of things environment | |
US11388193B2 (en) | Systems and methods for detecting online fraud | |
US10102372B2 (en) | Behavior profiling for malware detection | |
Sadiq et al. | A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0 | |
Choudhary et al. | Comparative analysis of mobile phishing detection and prevention approaches | |
CN110620753A (en) | System and method for countering attacks on a user's computing device | |
Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
Ahmed et al. | PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning | |
Chorghe et al. | A survey on anti-phishing techniques in mobile phones | |
Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
Vadariya et al. | A survey on phishing URL detection using artificial intelligence | |
Shahriar et al. | Mobile anti-phishing: Approaches and challenges | |
Lee et al. | A study on realtime detecting smishing on cloud computing environments | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Muppavaram et al. | How safe is your mobile app? mobile app attacks and defense | |
Guarda et al. | The art of phishing | |
James | Engineering the Human Mind: Social Engineering Attack Using Kali Linux | |
Sheik Abdullah et al. | Big Data and Analytics | |
Khalid et al. | Anti-phishing models for mobile application development: a review paper | |
Gautam et al. | Phishing prevention techniques: past, present and future | |
Raval et al. | Cyber-Awareness for Dummies | |
Arya | The Evolution of Phishing Attacks How Machine Learning Keeps Up | |
Sharma et al. | A Review of Anti-phishing Techniques and its Shortcomings |