Nothing Special   »   [go: up one dir, main page]

Park et al., 2023 - Google Patents

Demystifying the Regional Phishing Landscape in South Korea

Park et al., 2023

View PDF
Document ID
5993051325414172968
Author
Park H
Lim K
Kim D
Yu D
Koo H
Publication year
Publication venue
IEEE Access

External Links

Snippet

The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (eg, APWG) collectively maintains the up-to-date blacklist database (eg, eCrimeX) against phishing campaigns, and …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Han et al. Phisheye: Live monitoring of sandboxed phishing kits
Hu et al. {End-to-End} measurements of email spoofing attacks
Onaolapo et al. What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild
US9501639B2 (en) Methods, systems, and media for baiting inside attackers
McGuire et al. Cyber crime: A review of the evidence
Maroofi et al. COMAR: classification of compromised versus maliciously registered domains
Lazarov et al. Honey sheets: What happens to leaked google spreadsheets?
McRae et al. Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks
Akiyama et al. HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
Lee et al. Classification of attack types and analysis of attack methods for profiling phishing mail attack groups
Gupta et al. Emerging phishing trends and effectiveness of the anti-phishing landing page
Yoon et al. Doppelgängers on the dark web: A large-scale assessment on phishing hidden web services
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Kayode-Ajala Applying Machine Learning Algorithms for Detecting Phishing Websites: Applications of SVM, KNN, Decision Trees, and Random Forests
Chanti et al. A literature review on classification of phishing attacks
Li et al. Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Sloan Advanced persistent threat
Mohtasebi et al. A mitigation approach to the privacy and malware threats of social network services
Park et al. Demystifying the Regional Phishing Landscape in South Korea
Kara Don't bite the bait: phishing attack for internet banking (e-banking)
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Sankhwar et al. Defending Against Phishing: Case Studies.
Sunhare et al. Study of security vulnerabilities in social networking websites
Maurushat Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?
Nirmal et al. Enhancing online security using selective DOM approach to counter phishing attacks