Syiemlieh et al., 2015 - Google Patents
Phishing-an analysis on the types, causes, preventive measuresand case studies in the current situationSyiemlieh et al., 2015
View PDF- Document ID
- 10685410761089924621
- Author
- Syiemlieh P
- Khongsit G
- Sharma U
- Sharma B
- Publication year
- Publication venue
- IOSR J. Comput. Eng
External Links
Snippet
Phishing is a scam that has evolved many years ago and it has been growing ever since. In this study we have collected much information regarding its new and improvised way of scamming the users without their knowledge and concern. Some case studies are also …
- 230000003449 preventive 0 title abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brody et al. | PHISHING, PHARMING AND IDENTITY THEFT. | |
US9076132B2 (en) | System and method of addressing email and electronic communication fraud | |
Jagatic et al. | Social phishing | |
Banu et al. | A comprehensive study of phishing attacks | |
Weider et al. | A phishing vulnerability analysis of web based systems | |
Al-Hamar et al. | Enterprise Credential Spear-phishing attack detection | |
Syiemlieh et al. | Phishing-an analysis on the types, causes, preventive measuresand case studies in the current situation | |
Deliri et al. | Security and privacy issues in social networks | |
Salem et al. | Awareness program and ai based tool to reduce risk of phishing attacks | |
Singh | Detection of Phishing e-mail | |
Sharma et al. | Cybercrime: Internal security threat | |
Ivaturi et al. | Social engineering preparedness of online banks: An Asia-Pacific perspective | |
Greer | The growth of cybercrime in the United States | |
Chaudhary | Development review on phishing: a computer security threat | |
Enoch et al. | Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique | |
Mansfield-Devine | Bad behaviour: exploiting human weaknesses | |
Abdulla et al. | Consumer use of E-banking in Iraq: Security breaches and offered solution | |
Hegt | Analysis of current and future phishing attacks on internet banking services | |
Sankhwar et al. | Defending Against Phishing: Case Studies. | |
Bhardwaj et al. | Types of hacking attack and their countermeasure | |
Tanvir | Phishing-An Analysis About Types, Causes, Preventives and Case Research in The Modern-Day Situation | |
Egharevba | Phishing Attack-A Challenge in Cybersecurity | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
Mihai | Overview on phishing attacks | |
Patel et al. | Take a close look at phishing |