Durosinmi et al. - Google Patents
Phishing & Anti-phishing Techniques: An ExpositionDurosinmi et al.
View PDF- Document ID
- 11369619302263597528
- Author
- Durosinmi A
- Adenekan O
- Adekusibe K
- Alasiri O
External Links
Snippet
Phishing is a current social engineering attack that results in online identity theft. Although a simple attack, phishing has become a large problem for organizations that are doing online business. The number of phishing scams is continuously growing, and the cost of the …
- 238000000034 method 0 title abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Milletary et al. | Technical trends in phishing attacks | |
Aldawood et al. | An advanced taxonomy for social engineering attacks | |
Weider et al. | A phishing vulnerability analysis of web based systems | |
Huang et al. | Countermeasure techniques for deceptive phishing attack | |
Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
Rai et al. | A study on cyber crimes cyber criminals and major security breaches | |
Huang et al. | Browser-side countermeasures for deceptive phishing attack | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
Pathak | Cybercrime: A global threat to cybercommunity | |
Singh et al. | A survey on phishing and anti-phishing techniques | |
Lim et al. | Phishing security: Attack, detection, and prevention mechanisms | |
Hussain et al. | A survey on cyber security threats and their solutions | |
Bhati et al. | Prevention approach of phishing on different websites | |
Bhardwaj et al. | Types of hacking attack and their countermeasure | |
Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
Durosinmi et al. | Phishing & Anti-phishing Techniques: An Exposition | |
Mihai | Overview on phishing attacks | |
Kour | A Review on Cross-Site Request Forgery and its Defense Mechanism | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
Kamal et al. | Security and Privacy Issues in Wireless Networks and Mitigation Methods | |
Rashmitha et al. | Identification and Management of Frauds in Edge Computing Systems | |
Kaur et al. | CYBER SECURITY ATTACKS IN DIGITAL BANKING: EMERGING SECURITY CHALLENGES AND THREATS | |
Usha et al. | Phishing-A Challenge in the Internet |