Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Title | Phishing in Depth – Modern Methods of Detection and Risk Mitigation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Bikov, T. D., Iliev, T. B., Mihaylov, Gr. Y., Stoyanov, I. S. |
Conference Name | 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) |
Date Published | May 2019 |
Publisher | IEEE |
ISBN Number | 978-953-233-098-4 |
Keywords | attack vectors, Computer crime, electronic mail service, email attacks, fraud, fraudulent content, Human Behavior, human factors, machine learning, mass email infrastructures, Metrics, phishing, pubcrawl, resilience, Resiliency, risk mitigation, security defense mechanisms, security measures, Threat, threat mitigation, threats, unsolicited e-mail, virtual experiences |
Abstract | Nowadays, everyone is living in a digital world with various of virtual experiences and realities, but all of them may eventually cause real threats in our real world. Some of these threats have been born together with the first electronic mail service. Some of them might be considered as really basic and simple, compared to others that were developed and advanced in time to adapt themselves for the security defense mechanisms of the modern digital world. On a daily basis, more than 238.4 billion emails are sent worldwide, which makes more than 2.7 million emails per second, and these statistics are only from the publicly visible networks. Having that information and considering around 60% and above of all emails as threatening or not legitimate, is more than concerning. Unfortunately, even the modern security measures and systems are not capable to identify and prevent all the fraudulent content that is created and distributed every day. In this paper we will cover the most common attack vectors, involving the already mass email infrastructures, the required contra measures to minimize the impact over the corporate environments and what else should be developed to mitigate the modern sophisticated email attacks. |
URL | https://ieeexplore.ieee.org/document/8757074 |
DOI | 10.23919/MIPRO.2019.8757074 |
Citation Key | bikov_phishing_2019 |
- Phishing
- virtual experiences
- unsolicited e-mail
- threats
- threat mitigation
- threat
- security measures
- security defense mechanisms
- risk mitigation
- Resiliency
- resilience
- pubcrawl
- Attack vectors
- Metrics
- mass email infrastructures
- machine learning
- Human Factors
- Human behavior
- fraudulent content
- fraud
- email attacks
- electronic mail service
- Computer crime