Movatterモバイル変換


[0]ホーム

URL:


Jain et al., 2016 - Google Patents

A novel approach to protect against phishing attacks at client side using auto-updated white-list

Jain et al., 2016

ViewHTML @Full View
Document ID
6481515251625760295
Author
Jain A
Gupta B
Publication year
Publication venue
EURASIP Journal on Information Security

External Links

Snippet

Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low …
Continue reading atlink.springer.com (HTML) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

PublicationPublication DateTitle
Jain et al.A novel approach to protect against phishing attacks at client side using auto-updated white-list
Das Guptta et al.Modeling hybrid feature-based phishing websites detection using machine learning techniques
Rao et al.Detection of phishing websites using an efficient feature-based machine learning framework
Gupta et al.A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Jain et al.Towards detection of phishing websites on client-side using machine learning based approach
Sadiq et al.A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0
Vijayalakshmi et al.Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions
Mahajan et al.Phishing website detection using machine learning algorithms
Jain et al.Two-level authentication approach to protect from phishing attacks in real time
Mao et al.Phishing-alarm: Robust and efficient phishing detection via page component similarity
Tan et al.PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Jain et al.Comparative analysis of features based machine learning approaches for phishing detection
Gowtham et al.A comprehensive and efficacious architecture for detecting phishing webpages
Patil et al.Survey on malicious web pages detection techniques
KR100935776B1 (en) Network address evaluation methods, computer readable recording media, computer systems, network address access methods, how to utilize computer infrastructure, and how to perform enterprise network communication traffic analysis
WO2012101623A1 (en)Web element spoofing prevention system and method
Kara et al.Characteristics of understanding URLs and domain names features: the detection of phishing websites with machine learning methods
Mishra et al.Intelligent phishing detection system using similarity matching algorithms
Tharani et al.Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Atimorathanna et al.NoFish; total anti-phishing protection system
Aljahdalic et al.URL filtering using machine learning algorithms
Abiodun et al.Linkcalculator–an efficient link-based phishing detection tool
Thaker et al.Detecting phishing websites using data mining
Roopak et al.On effectiveness of source code and SSL based features for phishing website detection
Suriya et al.An integrated approach to detect phishing mail attacks: A case study

[8]
ページ先頭

©2009-2025 Movatter.jp