A Study of AIOT in Detecting Social Engineering Attacks: Phishing and Identity Theft
Keywords:
AIOT, phishing, Machine Learning, Identity TheftAbstract
With the advancement of technology, the Internet is becoming ubiquitous and available to everybody. There is a plethora of websites that provide various advantages. Despite their large quantity, not all these websites are genuine. Phishing sites are websites that trick people into serving their objectives. Phishing assaults, which have been around for ages and are still a huge issue today, pose a severe threat to the cyber world. Attackers are using a variety of innovative and inventive tactics to carry out phishing assaults, which are on the rise. Web browsing’s pervasiveness in our everyday lives, however, is not without security hazards. This standard web browsing habit, along with web users’ poor situational awareness of cyber dangers, exposes them to Phishing, malware, and profiling, among other hazards. Furthermore, phishing assaults are frequently used as an attack vector or the first stage in a more complex attack in today’s security climate. The usual method of comparing websites by using a blacklist and a whitelist is ineffective. As attackers have gotten more sophisticated in concealing and redirecting URLs, they may now fool users into phishing attacks without being caught. These Phishing attacks are used to commit all sorts of criminal activities like identity theft, whether in the form of Document theft, financial fraud, or medical fraud. As a result, new methodologies on machine learning algorithms (ML) are required to detect these phishing websites.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ateefa Rehan Siddiqui, Nor Azlina Abd Rahman , Khalida Shajaratuddur Harun
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
International Journal of Data Science and Advanced Analytics (IJDSAA) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. This license allows users to copy, distribute and transmit an article, adapt the article as long as the author is attributed and the article is not used for commercial purposes.
The author(s) confirms
- The manuscript submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The published materials used in the manuscript were obtained permission for reproduction. (if any)