[go: up one dir, main page]

Hashim et al., 2021 - Google Patents

Design a strong scheme to resist phishing attack

Hashim et al., 2021

View PDF
Document ID
10098260704571248830
Author
Hashim M
Yassin A
Publication year
Publication venue
Journal of Basrah Researches ((Sciences))

External Links

Snippet

Currently, the number of URLs that lead to increase risks for defrauding authorized users and then the attackers try to gain illegal access to user's accounts over a malicious attack is increasing exponentially. The most dangerous attack that deals with the URL is phishing …
Continue reading at iasj.rdd.edu.iq (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/141Denial of service attacks against endpoints in a network

Similar Documents

Publication Publication Date Title
US11165579B2 (en) Decentralized data authentication
Li et al. Analysing the Security of Google’s implementation of OpenID Connect
Fett et al. An extensive formal security analysis of the openid financial-grade api
CN103944900B (en) It is a kind of that attack prevention method and its device are asked across station based on encryption
Kim et al. A security analysis of blockchain-based did services
US10250589B2 (en) System and method for protecting access to authentication systems
Bojjagani et al. PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Cao et al. Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel
Abusaimeh Security attacks in cloud computing and corresponding defending mechanisims
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Zhang et al. El passo: privacy-preserving, asynchronous single sign-on
Wee et al. Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis
CN110572392A (en) Identity authentication method based on HyperLegger network
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Hashim et al. Design a strong scheme to resist phishing attack
Tan et al. Securing password authentication for web-based applications
Deeptha et al. Extending OpenID connect towards mission critical applications
Ang et al. Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis
CN104144054A (en) Login system based on server, login server and verification method of login server
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Ahmad et al. User requirement model for federated identities threats
Yasin et al. Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).
Yang et al. Context-Aware Phishing-Resistant Authentication for Federated Identity in Internet of Things Platforms
Mabel et al. Resisting Password Based Systems From Online Guessing Attacks