Weber, 2012 - Google Patents
Falling victim: why users are tricked by phishing attacksWeber, 2012
View PDF- Document ID
- 6238804225604789024
- Author
- Weber T
- Publication year
- Publication venue
- User Behavior
External Links
Snippet
Phishing is on the fast lane at current times. Despite of the research taken and the existing countermeasures, phishing attacks are continuing to expand. They have gained their own illegal marketplaces and cause tremendous financial damage every year, and are growing …
- 238000001514 detection method 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Purkait | Phishing counter measures and their effectiveness–literature review | |
Aburrous et al. | Experimental case studies for investigating e-banking phishing techniques and attack strategies | |
Andress | Foundations of information security: a straightforward introduction | |
Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
Sountharrajan et al. | Dynamic recognition of phishing URLs using deep learning techniques | |
Blanco Hache et al. | ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud | |
Bregant et al. | Cybercrime and computer crime | |
Al-Daraiseh et al. | Social networks’ benefits, privacy, and identity theft: KSA case study | |
Wu | Fighting phishing at the user interface | |
Jakobsson | The death of the internet | |
Brooks et al. | Influence under siege: Safeguarding influencers from cyberthreats | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
Bashir et al. | The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain | |
Bhadane et al. | STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS. | |
Medlin et al. | The cost of electronic retailing: Prevalent security threats and their results | |
David | Fraud, extortion and identity theft | |
Shaw | Why phishing works and the detection needed to prevent it | |
Jaishankar | Identity related Crime in the Cyberspace: Examining Phishing and its impact | |
Weber | Falling victim: why users are tricked by phishing attacks | |
Gautam et al. | Phishing prevention techniques: past, present and future | |
Sabadash et al. | Methods and Means of Identifying Fraudulent Websites. | |
Barker | Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career | |
Al-Daeef et al. | A review of client-side toolbars as a user-oriented anti-phishing solution |