[go: up one dir, main page]

Jain et al., 2016 - Google Patents

A novel approach to protect against phishing attacks at client side using auto-updated white-list

Jain et al., 2016

View HTML
Document ID
6481515251625760295
Author
Jain A
Gupta B
Publication year
Publication venue
EURASIP Journal on Information Security

External Links

Snippet

Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
Das Guptta et al. Modeling hybrid feature-based phishing websites detection using machine learning techniques
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Sadiq et al. A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0
Jain et al. Towards detection of phishing websites on client-side using machine learning based approach
Vijayalakshmi et al. Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions
Mahajan et al. Phishing website detection using machine learning algorithms
Jain et al. Two-level authentication approach to protect from phishing attacks in real time
Mao et al. Phishing-alarm: Robust and efficient phishing detection via page component similarity
Jain et al. Comparative analysis of features based machine learning approaches for phishing detection
Tan et al. PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Patil et al. Survey on malicious web pages detection techniques
KR100935776B1 (en) Network address evaluation methods, computer readable recording media, computer systems, network address access methods, how to utilize computer infrastructure, and how to perform enterprise network communication traffic analysis
WO2012101623A1 (en) Web element spoofing prevention system and method
Tharani et al. Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Mishra et al. Intelligent phishing detection system using similarity matching algorithms
Aljahdalic et al. URL filtering using machine learning algorithms
Atimorathanna et al. NoFish; total anti-phishing protection system
Abiodun et al. Linkcalculator–an efficient link-based phishing detection tool
Thaker et al. Detecting phishing websites using data mining
Mbah A phishing e-mail detection approach using machine learning techniques
Roopak et al. On effectiveness of source code and SSL based features for phishing website detection
Suriya et al. An integrated approach to detect phishing mail attacks: A case study
Boyapati et al. Anti-phishing approaches in the era of the internet of things