Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser… More >

  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol.4, No.4, pp. 239-267, 2022, DOI:10.32604/jcs.2023.041095

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938

    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%… More >

Displaying 1-10 on page 1 of 5. Per Page