[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Durosinmi et al. - Google Patents

Phishing & Anti-phishing Techniques: An Exposition

Durosinmi et al.

View PDF
Document ID
11369619302263597528
Author
Durosinmi A
Adenekan O
Adekusibe K
Alasiri O

External Links

Snippet

Phishing is a current social engineering attack that results in online identity theft. Although a simple attack, phishing has become a large problem for organizations that are doing online business. The number of phishing scams is continuously growing, and the cost of the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Milletary et al. Technical trends in phishing attacks
Aldawood et al. An advanced taxonomy for social engineering attacks
Weider et al. A phishing vulnerability analysis of web based systems
Huang et al. Countermeasure techniques for deceptive phishing attack
Wadhwa et al. A Review on Cyber Crime: Major Threats and Solutions.
Bose et al. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
Rai et al. A study on cyber crimes cyber criminals and major security breaches
Huang et al. Browser-side countermeasures for deceptive phishing attack
Afaq et al. A critical analysis of cyber threats and their global impact
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Pathak Cybercrime: A global threat to cybercommunity
Singh et al. A survey on phishing and anti-phishing techniques
Lim et al. Phishing security: Attack, detection, and prevention mechanisms
Hussain et al. A survey on cyber security threats and their solutions
Bhati et al. Prevention approach of phishing on different websites
Bhardwaj et al. Types of hacking attack and their countermeasure
Muttoo et al. Analysing security checkpoints for an integrated utility-based information system
Durosinmi et al. Phishing & Anti-phishing Techniques: An Exposition
Mihai Overview on phishing attacks
Kour A Review on Cross-Site Request Forgery and its Defense Mechanism
Teichmann et al. Phishing attacks: risks and challenges for law firms
Kamal et al. Security and Privacy Issues in Wireless Networks and Mitigation Methods
Rashmitha et al. Identification and Management of Frauds in Edge Computing Systems
Kaur et al. CYBER SECURITY ATTACKS IN DIGITAL BANKING: EMERGING SECURITY CHALLENGES AND THREATS
Usha et al. Phishing-A Challenge in the Internet