Park et al., 2023 - Google Patents
Demystifying the Regional Phishing Landscape in South KoreaPark et al., 2023
View PDF- Document ID
- 5993051325414172968
- Author
- Park H
- Lim K
- Kim D
- Yu D
- Koo H
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (eg, APWG) collectively maintains the up-to-date blacklist database (eg, eCrimeX) against phishing campaigns, and …
- 230000000116 mitigating effect 0 abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Han et al. | Phisheye: Live monitoring of sandboxed phishing kits | |
Hu et al. | {End-to-End} measurements of email spoofing attacks | |
Onaolapo et al. | What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild | |
US9501639B2 (en) | Methods, systems, and media for baiting inside attackers | |
McGuire et al. | Cyber crime: A review of the evidence | |
Maroofi et al. | COMAR: classification of compromised versus maliciously registered domains | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
McRae et al. | Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks | |
Akiyama et al. | HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle | |
Lee et al. | Classification of attack types and analysis of attack methods for profiling phishing mail attack groups | |
Gupta et al. | Emerging phishing trends and effectiveness of the anti-phishing landing page | |
Yoon et al. | Doppelgängers on the dark web: A large-scale assessment on phishing hidden web services | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Kayode-Ajala | Applying Machine Learning Algorithms for Detecting Phishing Websites: Applications of SVM, KNN, Decision Trees, and Random Forests | |
Chanti et al. | A literature review on classification of phishing attacks | |
Li et al. | Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites | |
Sloan | Advanced persistent threat | |
Mohtasebi et al. | A mitigation approach to the privacy and malware threats of social network services | |
Park et al. | Demystifying the Regional Phishing Landscape in South Korea | |
Kara | Don't bite the bait: phishing attack for internet banking (e-banking) | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Sankhwar et al. | Defending Against Phishing: Case Studies. | |
Sunhare et al. | Study of security vulnerabilities in social networking websites | |
Maurushat | Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools? | |
Nirmal et al. | Enhancing online security using selective DOM approach to counter phishing attacks |