Enterprise Credential Spear-phishing attack detection
نویسندگان
چکیده
The latest report by Kaspersky on email Spam and targeted Phishing attacks, percentage, highlights the need of an urgent solution. Attachment-driven Spear-phishing struggles to succeed against many providers’ malware-filtration systems, which proactively check emails for malicious software. In this paper, we provided a solution that can detect attacks based required similarities in specific domain it has been targeted. strategy is figure out whether genuine or forgery, be evaluated multi novel grading algorithms. Therefore, research addresses organisations presenting new enterprise This detection system focuses names, tend registered names trusted victims. results from investigation show proven its ability reduce phishing significantly.
منابع مشابه
Unpacking Spear Phishing Susceptibility
We report the results of a field experiment where we sent to over 1200 university students an email or a Facebook message with a link to (non-existing) party pictures from a non-existing person, and later asked them about the reasons for their link clicking behavior. We registered a significant difference in clicking rates: 20% of email versus 42.5% of Facebook recipients clicked. The most freq...
متن کاملRule-Based Phishing Attack Detection
The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...
متن کاملAn interdiscplinary study of phishing and spear-phishing attacks
In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...
متن کاملOptimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to maximize their success probability, attackers have to target the users that constitute the weakest links of the system. The optimal selection of these target users takes into account both the damage that can be caused by...
متن کاملA Design for an Anti-spear-phishing System Aycock
Phishing is a widespread and effective computer-mediated social attack. Phishers have proven highly adaptable in terms of exploiting new communications channels – witness ‘vishing’ and ‘SMiShing’ – and are becoming increasingly sophisticated. At the same time, research has shown that current anti-phishing measures are less than adequate. One concern in terms of malicious software is targeted at...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Electrical Engineering
سال: 2021
ISSN: ['0045-7906', '1879-0755']
DOI: https://doi.org/10.1016/j.compeleceng.2021.107363