Prince ISSA Khalifa | Indian Academy School of Management Studies, Bangalore University (original) (raw)

Uploads

Papers by Prince ISSA Khalifa

Research paper thumbnail of Study on Phishing Attacks

JETIR, 2023

Phishing, a deceptive practice that involves pretending to be a reliable organization in order to... more Phishing, a deceptive practice that involves pretending to be a reliable organization in order to get sensitive information online, has quickly evolved past low-skill approaches that concentrated on casting "a wide net." Attacks known as spear phishing use cutting-edge techniques to target a particular high-value person. One of the most prevalent cyber hazards in recent years is phishing, which targets people and businesses to steal sensitive data including login credentials, credit card numbers, and personal identity. We have examined current research publications on phishing attacks and methods for detecting them in this bibliographic analysis. The study demonstrates how phishing assaults have advanced over time, becoming more complex and challenging to identify. To reduce the danger of phishing assaults, a number of detection strategies have been developed. These techniques include heuristics-based detection, machine learning, content-based filtering, and reputation-based detection. To keep up with the attackers' shifting strategies, these methods must be updated and improved on a regular basis. In addition, the user's behavior and perception of online risks, as well as their knowledge of online resources, are vital in thwarting phishing attempts. Lastly, we advise that future study concentrate on creating more complex and precise detection systems and investigate the influence of cutting-edge technologies like blockchain on phishing avoidance. Index Termscyber hazards, phishing attacks, phishing assaults, machine learning, cutting-edge technique spear phishing.

Research paper thumbnail of Study on Phishing Attacks

JETIR, 2023

Phishing, a deceptive practice that involves pretending to be a reliable organization in order to... more Phishing, a deceptive practice that involves pretending to be a reliable organization in order to get sensitive information online, has quickly evolved past low-skill approaches that concentrated on casting "a wide net." Attacks known as spear phishing use cutting-edge techniques to target a particular high-value person. One of the most prevalent cyber hazards in recent years is phishing, which targets people and businesses to steal sensitive data including login credentials, credit card numbers, and personal identity. We have examined current research publications on phishing attacks and methods for detecting them in this bibliographic analysis. The study demonstrates how phishing assaults have advanced over time, becoming more complex and challenging to identify. To reduce the danger of phishing assaults, a number of detection strategies have been developed. These techniques include heuristics-based detection, machine learning, content-based filtering, and reputation-based detection. To keep up with the attackers' shifting strategies, these methods must be updated and improved on a regular basis. In addition, the user's behavior and perception of online risks, as well as their knowledge of online resources, are vital in thwarting phishing attempts. Lastly, we advise that future study concentrate on creating more complex and precise detection systems and investigate the influence of cutting-edge technologies like blockchain on phishing avoidance. Index Termscyber hazards, phishing attacks, phishing assaults, machine learning, cutting-edge technique spear phishing.