Shaukat et al., 2024 - Google Patents
Examination of phishing attempts on web-based business applications and their preventionsShaukat et al., 2024
View PDF- Document ID
- 13259208278239542930
- Author
- Shaukat S
- Rehman F
- Chhabra G
- Kaushik K
- Khan I
- Sharef H
- Ali M
- Ghaffar I
- Arshad M
- Publication year
- Publication venue
- 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
External Links
Snippet
Because of developments in the online sector, the occurrence of data breaches in web- based business systems is rising quickly. The attackers employ a range of different methods, including Distributed-Denial-of-Service attacks, Hacking Current Sessions, Reusing of …
- 230000002265 prevention 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
| Das Guptta et al. | Modeling hybrid feature-based phishing websites detection using machine learning techniques | |
| Sadiq et al. | A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0 | |
| Tewari et al. | Recent survey of various defense mechanisms against phishing attacks | |
| Gandotra et al. | Improving spoofed website detection using machine learning | |
| Swarnalatha et al. | Real-time threat intelligence-block phising attacks | |
| Paturi et al. | Detection of phishing attacks using visual similarity model | |
| Atimorathanna et al. | NoFish; total anti-phishing protection system | |
| Thaker et al. | Detecting phishing websites using data mining | |
| Ray et al. | Detection of malicious URLs using deep learning approach | |
| Shaukat et al. | Examination of phishing attempts on web-based business applications and their preventions | |
| Asirvatham et al. | SmishSMS-The latest detection of SMS phishing trends | |
| Abidoye et al. | Hybrid machine learning: A tool to detect phishing attacks in communication networks | |
| Vadariya et al. | A survey on phishing URL detection using artificial intelligence | |
| Sharma et al. | Enhancing cybersecurity: A machine learning approach for phishing website detection | |
| Demenongo et al. | Ensemble model for the detection of phishing URLs | |
| Rahim et al. | A survey on anti-phishing techniques: From conventional methods to machine learning | |
| Odeh et al. | Enhancing web security through machine learning-based detection of phishing websites | |
| Philomina et al. | A comparitative study of machine learning models for the detection of Phishing Websites | |
| Rahaman | The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals | |
| Krupalin et al. | A survey and taxonomy of anti-phishing techniques for detecting fake websites | |
| Khadir et al. | Efforts and Methodologies used in Phishing Email Detection and Filtering: A Survey. | |
| Mishra et al. | Prevention of phishing attack in internet-of-things based cyber-physical human system | |
| Tiwari et al. | Phishing Attack Detection Using Machine Learning Approaches and its Legal Landscape | |
| Gupta et al. | A contemporary anti-phishing framework based on visual cryptography and steganography |