[go: up one dir, main page]

Syiemlieh et al., 2015 - Google Patents

Phishing-an analysis on the types, causes, preventive measuresand case studies in the current situation

Syiemlieh et al., 2015

View PDF
Document ID
10685410761089924621
Author
Syiemlieh P
Khongsit G
Sharma U
Sharma B
Publication year
Publication venue
IOSR J. Comput. Eng

External Links

Snippet

Phishing is a scam that has evolved many years ago and it has been growing ever since. In this study we have collected much information regarding its new and improvised way of scamming the users without their knowledge and concern. Some case studies are also …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Brody et al. PHISHING, PHARMING AND IDENTITY THEFT.
US9076132B2 (en) System and method of addressing email and electronic communication fraud
Jagatic et al. Social phishing
Banu et al. A comprehensive study of phishing attacks
Weider et al. A phishing vulnerability analysis of web based systems
Al-Hamar et al. Enterprise Credential Spear-phishing attack detection
Syiemlieh et al. Phishing-an analysis on the types, causes, preventive measuresand case studies in the current situation
Deliri et al. Security and privacy issues in social networks
Salem et al. Awareness program and ai based tool to reduce risk of phishing attacks
Singh Detection of Phishing e-mail
Sharma et al. Cybercrime: Internal security threat
Ivaturi et al. Social engineering preparedness of online banks: An Asia-Pacific perspective
Greer The growth of cybercrime in the United States
Chaudhary Development review on phishing: a computer security threat
Enoch et al. Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
Mansfield-Devine Bad behaviour: exploiting human weaknesses
Abdulla et al. Consumer use of E-banking in Iraq: Security breaches and offered solution
Hegt Analysis of current and future phishing attacks on internet banking services
Sankhwar et al. Defending Against Phishing: Case Studies.
Bhardwaj et al. Types of hacking attack and their countermeasure
Tanvir Phishing-An Analysis About Types, Causes, Preventives and Case Research in The Modern-Day Situation
Egharevba Phishing Attack-A Challenge in Cybersecurity
Teichmann et al. Phishing attacks: risks and challenges for law firms
Mihai Overview on phishing attacks
Patel et al. Take a close look at phishing