Movatterモバイル変換


[0]ホーム

URL:


Hidayat et al., 2024 - Google Patents

Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data …

Hidayat et al., 2024

ViewPDF
Document ID
14022267182533997950
Author
Hidayat R
Anwar N
Publication year
Publication venue
Journal of Digital Security and Forensics

External Links

Snippet

Modern society heavily relies on digital technology and the internet, particularly on social media platforms like Facebook, which, despite their benefits, also pose security risks. In Q4 2023, a total of 8,161 phishing URLs were detected across 53 different domains, including …
Continue reading atwww.digitalsecurityforensics.org (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

PublicationPublication DateTitle
Hu et al.{End-to-End} measurements of email spoofing attacks
US10764313B1 (en)Method and system for protection against network-based cyber threats
Chaudhry et al.Phishing attacks and defenses
Ludl et al.On the effectiveness of techniques to detect phishing sites
Wu et al.Effective defense schemes for phishing attacks on mobile computing platforms
Abraham et al.An overview of social engineering malware: Trends, tactics, and implications
Bhardwaj et al.Privacy-aware detection framework to mitigate new-age phishing attacks
Dougan et al.Man in the browser attacks
US20160044054A1 (en)Network appliance for dynamic protection from risky network activities
US20060070126A1 (en)A system and methods for blocking submission of online forms.
PandeIntroduction to cyber security
Athulya et al.Towards the detection of phishing attacks
Verma et al.Cyber security: A review of cyber crimes, security challenges and measures to control
NagunwaBehind identity theft and fraud in cyberspace: the current landscape of phishing vectors
Ahmed et al.PhishCatcher: client-side defense against web spoofing attacks using machine learning
Stivala et al.Deceptive previews: A study of the link preview trustworthiness in social platforms
Hassan et al.Digital privacy and security using Windows: A practical guide
Tzschoppe et al.Browser-in-the-Middle-Evaluation of a modern approach to phishing
Orucho et al.Security threats affecting user-data on transit in mobile banking applications: A review
Singh et al.A survey on phishing and anti-phishing techniques
Hidayat et al.Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data Theft
Wozak et al.End-to-end security in telemedical networks–a practical guideline
Sukhram et al.KeyStroke logs: Are strong passwords enough?
Sakurai et al.Identifying the phishing websites using the patterns of tls certificates
Dhanalakshmi et al.Detection of phishing websites and secure transactions

[8]
ページ先頭

©2009-2025 Movatter.jp