Spear Watch: A Thorough Examination to Identify Spear Phishing Attacks

Author:

Shukla Anjali Shrikant, ,Chavan Sameer Rajendra,R SrivaramangaiORCID, ,

Abstract

A form of cybersecurity assault known as phishing involves hostile actors sending messages while posing as a reliable individual or organization. Spear-phishing assaults target a particular victim, and communications that pretend to be from someone they know and contain personal information are updated to directly address that victim. Spear-phishing takes more planning and effort to complete than phishing. Because these attacks are so skillfully customized, conventional security frequently cannot stop them. They are consequently getting harder to find. The spear phishing emails generally require a sophisticated security protocol, deploying threat detection and response tools. There are many research works with newer techniques applied for such systems. Most of them use AI, ML algorithms in identifying the threat and taking necessary actions. This paper emphasizes the importance of having much more enhanced techniques by means of research & development. To start with, the research this work focuses on exploring various detection techniques, where machine learning, natural language processing algorithms are used especially on behaviour analysis, and anomaly detection. This paper lays a foundation for future research in this area.

Publisher

Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP

Subject

Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science

Reference21 articles.

1. S. Kumudha and Aswathy Rajan, "A Critical Analysis of Cyber Phishing and its Impact on Banking Sector", International Journal of Pure and Applied Mathematics, Vol.119, No. 17, 2018, ISSN: 1314-3395 (on-line version), pp. 1-14.

2. Dhruv Rathee and Suman Mann, "Detection of E-Mail Phishing Attacks - using Machine Learning and Deep Learning", International Journal of Computer Applications, Vol.183, No. 47, 2022, pp. 1-7. [CrossRef]

3. Alhuseen O. Alsayed and Anwar L. Bilgrami, "E-Banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities", International Journal of Emerging Technology and Advanced Engineering, Vol.7, No. 1, 2017, ISSN 2250-2459, ISO 9001:2008 , pp. 1-7.

4. N.P. Singh, "Online Frauds in Banks with Phishing", Journal of Internet Banking & Commerce, 2010, ISSN: 1204-5357, pp. 1-18.

5. Kara Ilker, "Don't bite the bait: Phishing Attack for Internet Banking", The Journal of Digital Forensics, Security & Law, Vol.16, 2021, pp. 1-13.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Detection of Malware using Phishing Alarm;Indian Journal of Artificial Intelligence and Neural Networking;2023-12-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3