Hashim et al., 2021 - Google Patents
Design a strong scheme to resist phishing attackHashim et al., 2021
View PDF- Document ID
- 10098260704571248830
- Author
- Hashim M
- Yassin A
- Publication year
- Publication venue
- Journal of Basrah Researches ((Sciences))
External Links
Snippet
Currently, the number of URLs that lead to increase risks for defrauding authorized users and then the attackers try to gain illegal access to user's accounts over a malicious attack is increasing exponentially. The most dangerous attack that deals with the URL is phishing …
- 238000004891 communication 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11165579B2 (en) | Decentralized data authentication | |
| Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
| Fett et al. | An extensive formal security analysis of the openid financial-grade api | |
| CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
| Kim et al. | A security analysis of blockchain-based did services | |
| US10250589B2 (en) | System and method for protecting access to authentication systems | |
| Bojjagani et al. | PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification | |
| Alzuwaini et al. | An Efficient Mechanism to Prevent the Phishing Attacks. | |
| Cao et al. | Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel | |
| Abusaimeh | Security attacks in cloud computing and corresponding defending mechanisims | |
| Kushwaha et al. | A brief survey of challenge–response authentication mechanisms | |
| Zhang et al. | El passo: privacy-preserving, asynchronous single sign-on | |
| Wee et al. | Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis | |
| CN110572392A (en) | Identity authentication method based on HyperLegger network | |
| Pampori et al. | Securely eradicating cellular dependency for e-banking applications | |
| Hashim et al. | Design a strong scheme to resist phishing attack | |
| Tan et al. | Securing password authentication for web-based applications | |
| Deeptha et al. | Extending OpenID connect towards mission critical applications | |
| Ang et al. | Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis | |
| CN104144054A (en) | Login system based on server, login server and verification method of login server | |
| Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
| Ahmad et al. | User requirement model for federated identities threats | |
| Yasin et al. | Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). | |
| Yang et al. | Context-Aware Phishing-Resistant Authentication for Federated Identity in Internet of Things Platforms | |
| Mabel et al. | Resisting Password Based Systems From Online Guessing Attacks |