Figure - uploaded by Abeer Alotaibi
Content may be subject to copyright.
Related Work on phishing attack

Related Work on phishing attack

Source publication
Article
Full-text available
ARTICLE INFO ABSTRACT Recently, with the development of digital technology and the spread of the social media network and made the communication of human beings between each other more easily, but with the put the personal information and private evidence and the participation of others via the Internet, it causes a great danger that this informati...

Contexts in source publication

Context 1
... analysis: We know recently that social engineering has become a major threat and constitutes a major threat affecting the ordinary user and the large company and there are many types of attacks and phishing that occur through social engineering. Table 1 shows the details of phishing attacks that are through social engineering in addition to the mechanisms of the phishing detection approach. (2, 9, 17, 25)The latest research indicated five types of phishing attack through social engineering, and it is the most used type among attackers, as it collects and takes sensitive and confidential information from the victim and draws it without his knowledge. ...
Context 2
... know recently that social engineering has become a major threat and constitutes a major threat affecting the ordinary user and the large company and there are many types of attacks and phishing that occur through social engineering. Table 1 shows the details of phishing attacks that are through social engineering in addition to the mechanisms of the phishing detection approach.(2, 9, 17, 25)The latest research indicated five types of phishing attack through social engineering, and it is the most used type among attackers, as it collects and takes sensitive and confidential information from the victim and draws it without his knowledge. ...

Similar publications

Preprint
Full-text available
The growing and widespread presence of Internet of Things (IoT) has made the lives of all comfortable and handy, but poses various challenges, like efficiency, security, and high energy drain, threatening smart IoT-based applications. Small applications rely on Unicast communication. In a group-oriented communication, multicast is better as transmi...

Citations

... Consequently, industry standards are moving towards password guidelines developed with usability in mind, focusing on length rather than complexity [11]. Also, research results suggest that correctly identifying phishing is inherently difficult and calls for technical support systems [2]. ...
Conference Paper
Full-text available
Insecure user behavior is the most common cause of cyber-security incidents. Insecure behavior includes failing to detect phishing, insecure password management, and more. The problem has been known for decades, and state-of-the-art mitigation methods include security education, training, and awareness (SETA). A common problem with SETA is, however, that users do not seem to adopt it to a high enough extent. When users are not adopting SETA, its intended benefit is lost. Previous research argues for personalized SETA and suggests that different user groups have different SETA needs and preferences. The characteristics of those groups are, however, unknown. To that end, this research draws on an existing dataset to identify how different populations perceive different SETA methods. A quantitative analysis shows that users in different demographic groups have different SETA preferences , with age being the most impactful demographic. A qualitative analysis reveals further factors that impact user adoption of SETA, with cost and ease of use being important factors for further research.
... Phishing attacks are a persistent threat in the digital world, challenging traditional detection methods that often struggle to keep pace with the sophisticated and evolving techniques used by cybercriminals. Traditional methods frequently fail to detect attacks that utilize dynamic web content and advanced social engineering tactics [1], [2]. This underscores the need for more effective and scalable detection technologies that are also cost-efficient. ...
Preprint
Full-text available
With the rise of sophisticated phishing attacks, there is a growing need for effective and economical detection solutions. This paper explores the use of large multimodal agents, specifically Gemini 1.5 Flash and GPT-4o mini, to analyze both URLs and webpage screenshots via APIs, thus avoiding the complexities of training and maintaining AI systems. Our findings indicate that integrating these two data types substantially enhances detection performance over using either type alone. However, API usage incurs costs per query that depend on the number of input and output tokens. To address this, we propose a two-tiered agentic approach: initially, one agent assesses the URL, and if inconclusive, a second agent evaluates both the URL and the screenshot. This method not only maintains robust detection performance but also significantly reduces API costs by minimizing unnecessary multi-input queries. Cost analysis shows that with the agentic approach, GPT-4o mini can process about 4.2 times as many websites per $100 compared to the multimodal approach (107,440 vs. 25,626), and Gemini 1.5 Flash can process about 2.6 times more websites (2,232,142 vs. 862,068). These findings underscore the significant economic benefits of the agentic approach over the multimodal method, providing a viable solution for organizations aiming to leverage advanced AI for phishing detection while controlling expenses.
... Malware A collection of malicious applications designed to damage systems and steal data [27] Ransomware Malicious software that encrypts data, disables systems, and restricts authorized user access [28] Phishing A common form of social engineering wherein individuals are manipulated into divulging sensitive information, posing significant security risks [29] DDoS Denial-of-Service attacks that disrupt systems, preventing user access to network resources, and inflicting financial or reputational harm on organizations [30] SQL Injection ...
... Attackers take advantage of that by trying to lure them into external malicious applications or simply installing malware without the user suspecting anything. [16] When malicious software of the same type is installed on a large number of client machines, they form a BotNET-a set of installed bots connected to each other. They are mostly used for Denial of Service (DDoS) attacksandare often used for spamming. ...
Research
Full-text available
E-commerce is the purchasing and selling of merchandise and ventures, or the transmitting of assets or information, over an electronic network, essentially the internet. These business exchanges happen either as B2B, B2C, C2C or C2B. It is the exchanging or in items or services utilizing computer networks like Internet or online informal communities. Privacy concerns have been found, revealing a lack of trust in variety of contexts, including commerce, electronic health records, e-recruitment technology, and social networking, and this has directly influenced users. Security is one of the principal and continuing concerns that restrict customers and organizations engaging with ecommerce. Web e-commerce applications that handle payments have more compliance issues, are at increased risk from being targeted than other websites and there are greater consequences if there is data loss or alteration. E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. E-commerce offers the managing an account industry great chance, yet additionally creates a set of new dangers and vulnerability, for example, security threats, hackings.
... Malicious documents fall under social engineering [33], which can be defined as malicious activities that are facilitated through human interaction. The tactic uses psychological manipulation [34], which is the process of tricking a user to perform a certain task that will lead to the giving away of sensitive information or the opening of a backdoor that may compromise a system. ...
Article
Full-text available
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation, and timelining from heterogeneous cumulative data. Cumulative data heterogeneity poses significant challenges to the sound collection of electronically stored information (ESI) or digital evidence across cloud endpoints and/or networked systems. In addition, the distribution of networked systems and/or cloud environments makes it impossible for forensics investigators to be present at several premises to perform the investigation. Hence, it is important to have PDFI in place to ensure continuous operation in the event of a cyberattack, because it does not require the presence of an investigator at the target location. In this study, researchers put the idea of proactive digital forensics to the test and concluded that it is an indispensable tool for networked systems and cloud computing environments in response to modern-day digital forensics challenges. This research was based on an experimental computer science and engineering approach using a virtualised environment simulating an information communication infrastructure. To generate evidence (digital artefacts), and validate the proof-of-concept, adversary emulation was used by adapting the MITRE ATT&CK framework. Research results have shown that PDFI improves digital forensics activities in terms of speed and accuracy, thereby providing credible and timely comprehensive digital evidence. Enhanced Incident detection capabilities enable an analyst to focus much more on forensic investigation functions and thus perform their tasks effectively. However, the legality of live and/or remote forensics is still of great concern in several jurisdictions, thereby affecting the credibility of digital artefacts obtained in this manner. Nevertheless, where possible, the law component should also be kept up to date with modern-day technologies to solve any inconveniences caused by the ever-growing technology demands.
... The attacker conducts the attack on the target via extended methods such as phishing emails, pop-ups, SMS, fake programs, ransom ware, baiting among others, designed by the attacker until it falls to the target. (c) social, technical and physical attacks [1]. Social-based attacks are done via relationships with the target to play on their emotion and psychology. ...
Conference Paper
Social engineering which is otherwise known as human piracy, is the art of phishing and tracing a target to reveal his or her credentials in order to access networks or accounts. It employs deceptive and manipulative mechanisms on a target or just a follow-up, discovery, and curiosity[1]. Currently, the biggest threats facing cybersecurity are social engineering attacks. 84% of cyber-attacks are reported to have been conducted by social engineers with high success rates and such attacks have cost companies billions of dollars, which is far more than the cost of natural disasters[2]. Social engineering attacks can be detected but cannot be stopped nonetheless, evidence(s) of such cybercrime necessitates examination and analysis. In this paper, we propose Formal Concept Analysis for the analysis of social engineering cybercrime evidence.
... Saldırganın keşif esnasında işini kolaylaştıran en büyük güvenlik açığı, insan olmaktadır. Sosyal mühendislik, basit ve kolay yöntemlerden biri olarak tanımlanmakta ve saldırganın kurbanı kullanarak, saldırının temeli olan insan zayıflıklarından yararlanmayı, kişi veya kuruluşlar hakkında gizli bilgilere ulaşmayı amaçlamaktadır [7]. ...
Conference Paper
Full-text available
Due to the increasing number of cyber-attacks and unconscious internet use, many systems are in danger. These experienced and potential cyber threats lead experts trying to protect systems to conduct various researches on these issues. Models are needed to better analyze the attacks of the attackers before they attack the system and during the attack. In this article, the Cyber Kill Chain model, which consists of seven stages, created by Lockheed Martin company is examined. This modeling provides information to system administrators about how the attackers should intervene at what stage of the attack steps. In this article, the seven stages of the Cyber Kill Chain model are examined theoretically and practically. The steps of the Cyber Kill Chain model between the attacker's discovery and infiltration into the systems are explained in detail. For each of these seven steps, precautions against cyber-attacks are explained.
... In most cases, these attacks are carried out due to the user's inattention. Attackers take advantage of that by trying to lure them into external malicious applications or simply installing malware without the user suspecting anything (Alotaibi, 2021). These kinds of attacks can be categorized into two main types (Itgovernance, 2021): ...
Article
Full-text available
E-commerce security is part of the Web security problems that arise in all business information systems that operate over the Internet. However, in e-commerce security, the dimensions of web security – secrecy, integrity, and availability-are focused on protecting the consumer’s and e-store site’s assets from unauthorized access, use, alteration, or destruction. The paper presents an overview of the recent security issues in e-commerce applications and the usual points the attacker can target, such as the client (data, session, identity); the client computer; the network connection between the client and the webserver; the web server; third party software vendors. Discussed are effective approaches and tools used to address different e-commerce security threats. Special attention is paid to Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), phishing attacks, SQL injection, Man-in-the-middle, bots, denial-of-service, encryption, firewalls, SSL digital signatures, security certificates, PCI compliance. The research outlines and suggests many security solutions and best practices.