Phishing attack types and mitigation: A survey
dc.contributor.author | Alghenaim, Mohammed Fahad | |
dc.contributor.author | Bakar, Nur Azaliah Abu | |
dc.contributor.author | Abdul Rahim, Fiza | |
dc.contributor.author | Vanduhe, Vanye Zira | |
dc.contributor.author | Alkawsi, Gamal | |
dc.date.accessioned | 2023-06-19T10:55:51Z | |
dc.date.available | 2023-06-19T10:55:51Z | |
dc.date.issued | 2023 | en_US |
dc.department | Rektörlük, Bilişim Teknolojileri Uygulama ve Araştırma Merkezi | en_US |
dc.description.abstract | The proliferation of the internet and computing devices has drawn much attention during the Covid-19 pandemic stay home and work, and this has led the organization to adapt to staying home. Also, to let the organization work due to the infrastructure for working on proxy during the pandemic. The alarming rate of cyber-attacks, which through this study infer that phishing is one of the most effective and efficient ways for cyber-attack success. In this light, this study aims to study phishing attacks and mitigation methods in play, notwithstanding analysing performance metrics of the current mitigation performance metrics. Results indicate that business enterprises and educational institutions are the most hit using email (social engineering) and web app phishing attacks. The most effective mitigation methods are training/awareness campaigns on social engineering and using artificial intelligence/machine learning (AI/ML). To gain zero or 100% phishing mitigation, AI/ML need to be applied in large scale to measure its efficiency in phishing mitigation. | en_US |
dc.identifier.doi | 10.1007/978-981-99-0741-0_10 | en_US |
dc.identifier.scopus | 2-s2.0-85152077444 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.uri | https://hdl.handle.net/11467/6631 | |
dc.identifier.uri | https://doi.org/10.1007/978-981-99-0741-0_10 | |
dc.identifier.volume | 165 | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Lecture Notes on Data Engineering and Communications Technologies | en_US |
dc.relation.publicationcategory | Kitap Bölümü - Uluslararası | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Artificial intelligence; Machine learning; Mitigation; Phishing; Social engineering | en_US |
dc.title | Phishing attack types and mitigation: A survey | en_US |
dc.type | Book Chapter | en_US |
Dosyalar
Lisans paketi
1 - 1 / 1
Küçük Resim Yok
- Ä°sim:
- license.txt
- Boyut:
- 1.56 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama: