DE602007008174D1 - Verfahren und System zur Erkennung von Phishing - Google Patents
Verfahren und System zur Erkennung von PhishingInfo
- Publication number
- DE602007008174D1 DE602007008174D1 DE602007008174T DE602007008174T DE602007008174D1 DE 602007008174 D1 DE602007008174 D1 DE 602007008174D1 DE 602007008174 T DE602007008174 T DE 602007008174T DE 602007008174 T DE602007008174 T DE 602007008174T DE 602007008174 D1 DE602007008174 D1 DE 602007008174D1
- Authority
- DE
- Germany
- Prior art keywords
- detecting phishing
- phishing
- detecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/443,240 US7668921B2 (en) | 2006-05-30 | 2006-05-30 | Method and system for phishing detection |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602007008174D1 true DE602007008174D1 (de) | 2010-09-16 |
Family
ID=38421462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602007008174T Active DE602007008174D1 (de) | 2006-05-30 | 2007-05-30 | Verfahren und System zur Erkennung von Phishing |
Country Status (4)
Country | Link |
---|---|
US (1) | US7668921B2 (de) |
EP (1) | EP1863240B1 (de) |
JP (1) | JP5128848B2 (de) |
DE (1) | DE602007008174D1 (de) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US20080000970A1 (en) * | 2006-06-30 | 2008-01-03 | Savage Kent A | System and method for network-based talent contest |
US8220047B1 (en) | 2006-08-09 | 2012-07-10 | Google Inc. | Anti-phishing system and method |
US20080060062A1 (en) * | 2006-08-31 | 2008-03-06 | Robert B Lord | Methods and systems for preventing information theft |
US7676547B2 (en) * | 2006-09-22 | 2010-03-09 | Zyxel Communications Corp. | System for processing information including a mail subject of an e-mail not including all contents of the e-mail for controlling delivery of the mail subject requested by a host and method thereof |
US8578481B2 (en) * | 2006-10-16 | 2013-11-05 | Red Hat, Inc. | Method and system for determining a probability of entry of a counterfeit domain in a browser |
US8745151B2 (en) * | 2006-11-09 | 2014-06-03 | Red Hat, Inc. | Web page protection against phishing |
US20090006532A1 (en) * | 2007-06-28 | 2009-01-01 | Yahoo! Inc. | Dynamic phishing protection in instant messaging |
US8438610B2 (en) * | 2007-09-28 | 2013-05-07 | Emc Corporation | Identity-based address normalization |
US8091118B2 (en) * | 2007-12-21 | 2012-01-03 | At & T Intellectual Property I, Lp | Method and system to optimize efficiency when managing lists of untrusted network sites |
US8856937B1 (en) | 2008-06-27 | 2014-10-07 | Symantec Corporation | Methods and systems for identifying fraudulent websites |
US20090328208A1 (en) * | 2008-06-30 | 2009-12-31 | International Business Machines | Method and apparatus for preventing phishing attacks |
US20100042687A1 (en) * | 2008-08-12 | 2010-02-18 | Yahoo! Inc. | System and method for combating phishing |
US20100057895A1 (en) * | 2008-08-29 | 2010-03-04 | At& T Intellectual Property I, L.P. | Methods of Providing Reputation Information with an Address and Related Devices and Computer Program Products |
US20100154055A1 (en) * | 2008-12-12 | 2010-06-17 | At&T Intellectual Property I, L.P. | Prefix Domain Matching for Anti-Phishing Pattern Matching |
US8225401B2 (en) * | 2008-12-18 | 2012-07-17 | Symantec Corporation | Methods and systems for detecting man-in-the-browser attacks |
CN101504673B (zh) | 2009-03-24 | 2011-09-07 | 阿里巴巴集团控股有限公司 | 一种识别疑似仿冒网站的方法与系统 |
US8438642B2 (en) | 2009-06-05 | 2013-05-07 | At&T Intellectual Property I, L.P. | Method of detecting potential phishing by analyzing universal resource locators |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US8793799B2 (en) | 2010-11-16 | 2014-07-29 | Booz, Allen & Hamilton | Systems and methods for identifying and mitigating information security risks |
US9065850B1 (en) | 2011-02-07 | 2015-06-23 | Zscaler, Inc. | Phishing detection systems and methods |
EP3462317A1 (de) | 2011-02-18 | 2019-04-03 | CSidentity Corporation | System und verfahren zur identifikation kompromittierender persönlicher informationen im internet |
CN102902917A (zh) * | 2011-07-29 | 2013-01-30 | 国际商业机器公司 | 用于预防钓鱼式攻击的方法和系统 |
US8819793B2 (en) | 2011-09-20 | 2014-08-26 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
US8700913B1 (en) | 2011-09-23 | 2014-04-15 | Trend Micro Incorporated | Detection of fake antivirus in computers |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US9432401B2 (en) | 2012-07-06 | 2016-08-30 | Microsoft Technology Licensing, Llc | Providing consistent security information |
US9356948B2 (en) | 2013-02-08 | 2016-05-31 | PhishMe, Inc. | Collaborative phishing attack detection |
US9398038B2 (en) | 2013-02-08 | 2016-07-19 | PhishMe, Inc. | Collaborative phishing attack detection |
US8966637B2 (en) | 2013-02-08 | 2015-02-24 | PhishMe, Inc. | Performance benchmarking for simulated phishing attacks |
US9053326B2 (en) | 2013-02-08 | 2015-06-09 | PhishMe, Inc. | Simulated phishing attack with sequential messages |
US9253207B2 (en) | 2013-02-08 | 2016-02-02 | PhishMe, Inc. | Collaborative phishing attack detection |
US9344449B2 (en) | 2013-03-11 | 2016-05-17 | Bank Of America Corporation | Risk ranking referential links in electronic messages |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
US9621566B2 (en) | 2013-05-31 | 2017-04-11 | Adi Labs Incorporated | System and method for detecting phishing webpages |
US9203849B2 (en) | 2013-12-04 | 2015-12-01 | Apple Inc. | Preventing URL confusion attacks |
US9262629B2 (en) | 2014-01-21 | 2016-02-16 | PhishMe, Inc. | Methods and systems for preventing malicious use of phishing simulation records |
WO2016049644A1 (en) | 2014-09-26 | 2016-03-31 | Sanjay Parekh | Method and system for email privacy, security and information theft detection |
RU2682038C2 (ru) * | 2014-09-30 | 2019-03-14 | Общество С Ограниченной Ответственностью "Яндекс" | Способ обработки сообщений электронной почты, содержащих цитируемый текст, и компьютер, используемый в нем |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US9398047B2 (en) | 2014-11-17 | 2016-07-19 | Vade Retro Technology, Inc. | Methods and systems for phishing detection |
US9253208B1 (en) | 2015-03-05 | 2016-02-02 | AO Kaspersky Lab | System and method for automated phishing detection rule evolution |
US9906539B2 (en) | 2015-04-10 | 2018-02-27 | PhishMe, Inc. | Suspicious message processing and incident response |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US9781132B2 (en) * | 2015-10-13 | 2017-10-03 | Yahoo Holdings, Inc. | Fraud prevention |
US10140273B2 (en) * | 2016-01-19 | 2018-11-27 | International Business Machines Corporation | List manipulation in natural language processing |
US10142366B2 (en) * | 2016-03-15 | 2018-11-27 | Vade Secure, Inc. | Methods, systems and devices to mitigate the effects of side effect URLs in legitimate and phishing electronic messages |
GB201605004D0 (en) * | 2016-03-24 | 2016-05-11 | Secr Defence | A method of protecting a user from messages with links to malicious websites |
US10193923B2 (en) * | 2016-07-20 | 2019-01-29 | Duo Security, Inc. | Methods for preventing cyber intrusions and phishing activity |
CN107526967B (zh) * | 2017-07-05 | 2020-06-02 | 阿里巴巴集团控股有限公司 | 一种风险地址识别方法、装置以及电子设备 |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10834111B2 (en) | 2018-01-29 | 2020-11-10 | International Business Machines Corporation | Method and system for email phishing attempts identification and notification through organizational cognitive solutions |
US20190319905A1 (en) * | 2018-04-13 | 2019-10-17 | Inky Technology Corporation | Mail protection system |
US11108821B2 (en) * | 2019-05-01 | 2021-08-31 | KnowBe4, Inc. | Systems and methods for use of address fields in a simulated phishing attack |
US11882112B2 (en) | 2021-05-26 | 2024-01-23 | Bank Of America Corporation | Information security system and method for phishing threat prevention using tokens |
US11792224B2 (en) | 2021-05-26 | 2023-10-17 | Bank Of America Corporation | Information security system and method for phishing threat detection using tokens |
CN113556347B (zh) * | 2021-07-22 | 2023-04-07 | 深信服科技股份有限公司 | 一种钓鱼邮件的检测方法、装置、设备及存储介质 |
US11882152B2 (en) | 2021-07-30 | 2024-01-23 | Bank Of America Corporation | Information security system and method for phishing website identification based on image hashing |
US11856005B2 (en) * | 2021-09-16 | 2023-12-26 | Centripetal Networks, Llc | Malicious homoglyphic domain name generation and associated cyber security applications |
CN114095278B (zh) * | 2022-01-19 | 2022-05-24 | 南京明博互联网安全创新研究院有限公司 | 一种基于混合特征选择框架的钓鱼网站检测方法 |
WO2023187352A1 (en) * | 2022-03-30 | 2023-10-05 | Egress Software Technologies Ip Limited | Method and system for processing data packages |
WO2023196376A1 (en) * | 2022-04-07 | 2023-10-12 | Cisco Technology, Inc. | Algorithm to detect malicious emails impersonating brands |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7219298B2 (en) * | 2001-03-15 | 2007-05-15 | International Business Machines Corporation | Method, system, and program for verifying network addresses included in a file |
US8145710B2 (en) * | 2003-06-18 | 2012-03-27 | Symantec Corporation | System and method for filtering spam messages utilizing URL filtering module |
US7421498B2 (en) * | 2003-08-25 | 2008-09-02 | Microsoft Corporation | Method and system for URL based filtering of electronic communications and web pages |
US7664812B2 (en) * | 2003-10-14 | 2010-02-16 | At&T Intellectual Property I, L.P. | Phonetic filtering of undesired email messages |
JP2005135328A (ja) * | 2003-10-31 | 2005-05-26 | Nec Corp | メールサーバ、電子メール管理方法及び電子メール管理プログラム |
US8060915B2 (en) | 2003-12-30 | 2011-11-15 | Entrust, Inc. | Method and apparatus for providing electronic message authentication |
US20050216564A1 (en) * | 2004-03-11 | 2005-09-29 | Myers Gregory K | Method and apparatus for analysis of electronic communications containing imagery |
US7529802B2 (en) | 2004-06-16 | 2009-05-05 | International Business Machines Corporation | Method for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value |
WO2006020095A2 (en) | 2004-07-16 | 2006-02-23 | Geotrust, Inc. | Security systems and services to provide identity and uniform resource identifier verification |
US7422115B2 (en) | 2004-09-07 | 2008-09-09 | Iconix, Inc. | Techniques for to defeat phishing |
US20060053202A1 (en) | 2004-09-09 | 2006-03-09 | Chris Foo | Method and system implementing secure email |
US20060059111A1 (en) | 2004-09-10 | 2006-03-16 | Tucker David M | Authentication method for securely disclosing confidential information over the internet |
US20060080735A1 (en) | 2004-09-30 | 2006-04-13 | Usa Revco, Llc | Methods and systems for phishing detection and notification |
US7461339B2 (en) * | 2004-10-21 | 2008-12-02 | Trend Micro, Inc. | Controlling hostile electronic mail content |
US8032594B2 (en) * | 2004-11-10 | 2011-10-04 | Digital Envoy, Inc. | Email anti-phishing inspector |
US7634810B2 (en) * | 2004-12-02 | 2009-12-15 | Microsoft Corporation | Phishing detection, prevention, and notification |
US7366762B2 (en) * | 2005-10-04 | 2008-04-29 | International Business Machines Corporation | Method for monitoring and reporting usage of non-hypertext markup language e-mail campaigns |
US20070136806A1 (en) * | 2005-12-14 | 2007-06-14 | Aladdin Knowledge Systems Ltd. | Method and system for blocking phishing scams |
-
2006
- 2006-05-30 US US11/443,240 patent/US7668921B2/en not_active Expired - Fee Related
-
2007
- 2007-05-23 JP JP2007136136A patent/JP5128848B2/ja not_active Expired - Fee Related
- 2007-05-30 DE DE602007008174T patent/DE602007008174D1/de active Active
- 2007-05-30 EP EP07109187A patent/EP1863240B1/de not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
JP2007323640A (ja) | 2007-12-13 |
EP1863240A2 (de) | 2007-12-05 |
US20070283000A1 (en) | 2007-12-06 |
JP5128848B2 (ja) | 2013-01-23 |
US7668921B2 (en) | 2010-02-23 |
EP1863240A3 (de) | 2009-03-25 |
EP1863240B1 (de) | 2010-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602007008174D1 (de) | Verfahren und System zur Erkennung von Phishing | |
DE602007008120D1 (de) | System zur erkennung von augenöffnung und verfahren zur erkennung von augenöffnung | |
DE602006001379D1 (de) | Vorrichtung und Verfahren zur Erfassung von Verschiebungen | |
DE602006013180D1 (de) | Verfahren und system zur reduzierung von verbindungslatenzen | |
ATE473570T1 (de) | Verfahren und vorrichtung zur endknoten- gestützten neighbor-erkennung | |
DE102006033605B8 (de) | Vorrichtung und Verfahren zur Bestimmung von Vertikalpositionen | |
DE602007010563D1 (de) | Verfahren und System zur Anzeige von Alarmnachrichten | |
DE502006008842D1 (de) | Hörvorrichtung und entsprechendes Verfahren zur Eigenstimmendetektion | |
BRPI0719397A2 (pt) | Metódo e aparelho de separação | |
DE602007006380D1 (de) | Verfahren und Vorrichtung zur Fahrunterstützung | |
DE602006006454D1 (de) | Verfahren und Vorrichtung zur Authentifizierung | |
DE602008001924D1 (de) | Verfahren und System zur Erkennung unerwünschter Inferenzen von Dokumenten | |
DE602006007458D1 (de) | Verfahren und vorrichtung zur bohrlochfluidanalyse | |
DE112009000684A5 (de) | System und Verfahren zur multidimensionalen Gestenauswertung | |
DE602007000066D1 (de) | Verfahren und Gerät zur Verwaltung von verteilten Inhalten | |
DE602006021341D1 (de) | Rauchgasnassentschwefelungsvorrichtung und verfahren zur rauchgasnassentschwefelung | |
DE602006009995D1 (de) | System und Verfahren zur Dokumentverteilung | |
DE602006008098D1 (de) | Verfahren und System zur Verwaltung von Datenverkehr | |
ATE523949T1 (de) | Verfahren zur regelung von wechselrichtern | |
DE602006000614D1 (de) | Vorrichtung und Verfahren zur Standortbestimmung | |
DE602007013239D1 (de) | Vorrichtung und verfahren zur detektion von nachbarkanalstörungen | |
DE602006005474D1 (de) | Verfahren und Vorrichtung zur Zuweisung von Unterträgern | |
DE602007002333D1 (de) | CAM-System und Verfahren dazu | |
DE602007000339D1 (de) | Verstärkereinheit und Verfahren zur Fehlererkennung dafür | |
DE602006015265D1 (de) | System und Verfahren zur Aufzugsgruppensteuerung |