Jain et al., 2016 - Google Patents
A novel approach to protect against phishing attacks at client side using auto-updated white-listJain et al., 2016
View HTML- Document ID
- 6481515251625760295
- Author
- Jain A
- Gupta B
- Publication year
- Publication venue
- EURASIP Journal on Information Security
External Links
Snippet
Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low …
- 230000002633 protecting 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | A novel approach to protect against phishing attacks at client side using auto-updated white-list | |
| Das Guptta et al. | Modeling hybrid feature-based phishing websites detection using machine learning techniques | |
| Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
| Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
| Sadiq et al. | A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0 | |
| Jain et al. | Towards detection of phishing websites on client-side using machine learning based approach | |
| Vijayalakshmi et al. | Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions | |
| Mahajan et al. | Phishing website detection using machine learning algorithms | |
| Jain et al. | Two-level authentication approach to protect from phishing attacks in real time | |
| Mao et al. | Phishing-alarm: Robust and efficient phishing detection via page component similarity | |
| Jain et al. | Comparative analysis of features based machine learning approaches for phishing detection | |
| Tan et al. | PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder | |
| Patil et al. | Survey on malicious web pages detection techniques | |
| KR100935776B1 (en) | Network address evaluation methods, computer readable recording media, computer systems, network address access methods, how to utilize computer infrastructure, and how to perform enterprise network communication traffic analysis | |
| WO2012101623A1 (en) | Web element spoofing prevention system and method | |
| Tharani et al. | Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach | |
| Mishra et al. | Intelligent phishing detection system using similarity matching algorithms | |
| Aljahdalic et al. | URL filtering using machine learning algorithms | |
| Atimorathanna et al. | NoFish; total anti-phishing protection system | |
| Abiodun et al. | Linkcalculator–an efficient link-based phishing detection tool | |
| Thaker et al. | Detecting phishing websites using data mining | |
| Mbah | A phishing e-mail detection approach using machine learning techniques | |
| Roopak et al. | On effectiveness of source code and SSL based features for phishing website detection | |
| Suriya et al. | An integrated approach to detect phishing mail attacks: A case study | |
| Boyapati et al. | Anti-phishing approaches in the era of the internet of things |