Kumar et al., 2022 - Google Patents
Empirical Methods, Anomaly Detection and Preventive Measures of Web AttacksKumar et al., 2022
- Document ID
- 3778208246193741095
- Author
- Kumar R
- Arora N
- Gera T
- Jain A
- Thakur D
- Publication year
- Publication venue
- 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)
External Links
Snippet
The digital world has captured great market response in recent years. Users are almost completely dependent on the web for availing of products and various services. Web applications are known to solve one-stop solutions for users. Considering the importance of …
- 238000001514 detection method 0 title abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9942250B2 (en) | Network appliance for dynamic protection from risky network activities | |
| US8826400B2 (en) | System for automated prevention of fraud | |
| Hyslip | Cybercrime-as-a-service operations | |
| Chanti et al. | A literature review on classification of phishing attacks | |
| Kumar et al. | Network security–an updated perspective | |
| Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
| Alghenaim et al. | Phishing attack types and mitigation: A survey | |
| Diwan | An investigation and analysis of cyber security information systems: latest trends and future suggestion | |
| Rani et al. | Cloud computing security: a taxonomy, threat detection and mitigation techniques | |
| Hossain et al. | Classifying cyberattacks on financial organizations based on publicly available deep web dataset | |
| Rahman et al. | Botnet threats to e-commerce web applications and their detection | |
| Alnajim et al. | An approach to the implementation of the anti-phishing tool for phishing websites detection | |
| Banday et al. | Phishing-A growing threat to e-commerce | |
| Singh et al. | Present Status of Distributed Denial of service (DDoS) attacks in internet world | |
| Agarwal et al. | Examining Newly Registered Phishing Domains at Scale | |
| Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
| Hussain et al. | A survey on cyber security threats and their solutions | |
| Kumar et al. | Empirical Methods, Anomaly Detection and Preventive Measures of Web Attacks | |
| Srivastava | An introduction to network security attacks | |
| Sujeetha et al. | Cyber-space and its menaces | |
| Ahmed et al. | Cyber threats in the healthcare sector and countermeasures | |
| Belghith | Investigation on e-commerce platforms for tackling e-business security challenge. | |
| Belghith | e-CommerceShield: A framework for enhanced security in e-commerce with awareness, DNS matching, and blockchain integration | |
| Bhardwaj et al. | Types of hacking attack and their countermeasure | |
| Terneva et al. | Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester |