2009 eCrime Researchers Summit 2009
DOI: 10.1109/ecrime.2009.5342620
|View full text |Cite
|
Sign up to set email alerts
|

Humboldt: A distributed phishing disruption system

Abstract: Conventional techniques for combating phishing have focused primarily on detecting phishing web sites and preventing users from revealing their passwords to such sites. This passive form of defense is by its nature incomplete and does nothing to protect users that do reveal their passwords. Combating the phishing threat requires more than simple avoidance-it requires a more active approach to disrupting even successful phishing operations.Humboldt is a distributed system that submits poisonous fake data to phi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Base64 encoding is a form of encoding data into an ASCII string of characters, so that it can be securely and safely sent along a transmission line that deals primarily with text [8]. This can be used within a web based PHP program to obfuscate the code of the program, so that it is less understandable by humans.…”
Section: Base64 Encodingmentioning
confidence: 99%
“…Base64 encoding is a form of encoding data into an ASCII string of characters, so that it can be securely and safely sent along a transmission line that deals primarily with text [8]. This can be used within a web based PHP program to obfuscate the code of the program, so that it is less understandable by humans.…”
Section: Base64 Encodingmentioning
confidence: 99%
“…With the rapid development and popularization of the computer network technology, while bringing convenience to people's lives, the corresponding computer crime also showed a rising trend year by year. Intruding the website is one of the very important intrusions, especially for the intrusion websites of government, bank and others [1]. The light is bringing inconvenience to people's life, the heavy is serious damage to national security and people's property security.…”
Section: Introductionmentioning
confidence: 99%
“…The underground economics based on Internet scams and frauds is also booming. Attackers increasingly initiate e-crime attacks and abuses [1][2][3][4][5] , such as spam, phishing attacks, and Internet worms. Firewalls, Intrusion Detection Systems (IDS), and Anti-Virus Gateway are now widely deployed in edge networks to protect end-systems from attack.…”
Section: Introductionmentioning
confidence: 99%