TY - GEN
T1 - Phishing and Intrusion Attacks
T2 - 3rd International Informatics and Software Engineering Conference, IISEC 2022
AU - Tareen, Saima
AU - Bazai, Sibghat Ullah
AU - Ullah, Shafi
AU - Ullah, Rehmat
AU - Marjan, Shah
AU - Ghafoor, Muhmmad Imran
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022/12/29
Y1 - 2022/12/29
N2 - The digital world is becoming increasingly interconnected and cyberattacks such as phishing are becoming more common. Fraudulent emails and bogus websites are used to obtain sensitive information from online users to obtain their personal information. Cyberattacks are becoming increasingly sophisticated, which makes detecting scam attacks more difficult. In order to detect phishing attacks accurately, a variety of approaches have been examined, including rules-based systems, lists-based systems, heuristic-based systems, and content-based systems, among others, with the most effective list-based systems and machine learning systems. Over the past couple of years, Deep Learning has proven to be one of the most effective algorithms for machine learning. Specifically, this paper explores and provides an overview of existing anti-phishing approaches, as well as how fraudulent URLs can be classified using machine learning and deep learning algorithms.
AB - The digital world is becoming increasingly interconnected and cyberattacks such as phishing are becoming more common. Fraudulent emails and bogus websites are used to obtain sensitive information from online users to obtain their personal information. Cyberattacks are becoming increasingly sophisticated, which makes detecting scam attacks more difficult. In order to detect phishing attacks accurately, a variety of approaches have been examined, including rules-based systems, lists-based systems, heuristic-based systems, and content-based systems, among others, with the most effective list-based systems and machine learning systems. Over the past couple of years, Deep Learning has proven to be one of the most effective algorithms for machine learning. Specifically, this paper explores and provides an overview of existing anti-phishing approaches, as well as how fraudulent URLs can be classified using machine learning and deep learning algorithms.
KW - classification
KW - Cyber security
KW - cyberspace
KW - Deep Learning
KW - intrusion
KW - machine learning
KW - Phishing
KW - Social Engineering
UR - http://www.scopus.com/inward/record.url?scp=85146371968&partnerID=8YFLogxK
U2 - 10.1109/IISEC56263.2022.9998205
DO - 10.1109/IISEC56263.2022.9998205
M3 - Conference contribution
AN - SCOPUS:85146371968
T3 - 3rd International Informatics and Software Engineering Conference, IISEC 2022
BT - 3rd International Informatics and Software Engineering Conference, IISEC 2022
A2 - Varol, Asaf
A2 - Karabatak, Murat
A2 - Varol, Cihan
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 15 December 2022 through 16 December 2022
ER -