%0 Journal Article
%T Study on Phishing Attack Behaviours and Defence Model
Phishing攻击行为及其防御模型研究
%A ZHANG Bo
%A LI Wei-Hua
%A
张博
%A 李伟华
%J 计算机科学
%D 2006
%I
%X The phishing hazard becomes more and more terribly, This paper introduces and analyzes the phishing attack behaviors. It adopts the methods of building the attack forest and sorting the attack behaviours and then constitutes the attack model. We present the anti-phishing theory system and some eounterrneasure. Furthermore we analyzes the phishing attack and defenee based on the IPv6.
%K IPv6
仿冒
%K 攻击行为
%K 防御体系
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=9A14C6F536ACAB43&yid=37904DC365DD7266&vid=27746BCEEE58E9DC&iid=38B194292C032A66&sid=A4FA325EA800C820&eid=8C83C265AD318E34&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=5