Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2006, Vol. 32 ›› Issue (14): 125-126,. doi: 10.3969/j.issn.1000-3428.2006.14.046

• Security Technology • Previous Articles     Next Articles

Study on Phishing Attack Behaviours and Defence Model

ZHANG Bo;LI Weihua   

  1. College of Computer Science, Northwestern Polytechnical University, Xi’an 710072
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-07-20 Published:2006-07-20

Phishing攻击行为及其防御模型研究

张 博;李伟华   

  1. 西北工业大学计算机学院,西安 710002

Abstract: The phishing hazard becomes more and more terrible. This paper introduces and analyses the phishing attack behaviors. It adopts the methods of building the attack forest and sorting the attack behaviours and then constitutes the attack model. It presents the anti-phishing theory system and some countermeasure. Furthermore it analyses the phishing attack and defence based on the IPv6.

Key words: Phishing, IPv6, Attack behaviors, Defense system

摘要: 仿冒(Phishing)危害愈演愈烈,针对其攻击行为进行了详细的分析与介绍,其中使用了建立攻击森林和对攻击进行分类等方法,进而建立了Phishing攻击模型。提出了相应的Phishing攻击的防范理论体系和具体措施。同时高起点地分析了IPv6环境下的Phishing攻击及其防御。

关键词: 仿冒, IPv6, 攻击行为, 防御体系

CLC Number: