[go: up one dir, main page]

Weber, 2012 - Google Patents

Falling victim: why users are tricked by phishing attacks

Weber, 2012

View PDF
Document ID
6238804225604789024
Author
Weber T
Publication year
Publication venue
User Behavior

External Links

Snippet

Phishing is on the fast lane at current times. Despite of the research taken and the existing countermeasures, phishing attacks are continuing to expand. They have gained their own illegal marketplaces and cause tremendous financial damage every year, and are growing …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Purkait Phishing counter measures and their effectiveness–literature review
Aburrous et al. Experimental case studies for investigating e-banking phishing techniques and attack strategies
Andress Foundations of information security: a straightforward introduction
Chen et al. Exploring internet security perceptions and practices in urban ghana
Sountharrajan et al. Dynamic recognition of phishing URLs using deep learning techniques
Blanco Hache et al. ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud
Bregant et al. Cybercrime and computer crime
Al-Daraiseh et al. Social networks’ benefits, privacy, and identity theft: KSA case study
Wu Fighting phishing at the user interface
Jakobsson The death of the internet
Brooks et al. Influence under siege: Safeguarding influencers from cyberthreats
Frauenstein An investigation into students responses to various phishing emails and other phishing-related behaviours
Chaudhary et al. Recognition of phishing attacks utilizing anomalies in phishing websites
Bashir et al. The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain
Bhadane et al. STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS.
Medlin et al. The cost of electronic retailing: Prevalent security threats and their results
David Fraud, extortion and identity theft
Shaw Why phishing works and the detection needed to prevent it
Jaishankar Identity related Crime in the Cyberspace: Examining Phishing and its impact
Weber Falling victim: why users are tricked by phishing attacks
Gautam et al. Phishing prevention techniques: past, present and future
Sabadash et al. Methods and Means of Identifying Fraudulent Websites.
Barker Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
Al-Daeef et al. A review of client-side toolbars as a user-oriented anti-phishing solution