Visible to the public Phishing in Depth – Modern Methods of Detection and Risk Mitigation

TitlePhishing in Depth – Modern Methods of Detection and Risk Mitigation
Publication TypeConference Paper
Year of Publication2019
AuthorsBikov, T. D., Iliev, T. B., Mihaylov, Gr. Y., Stoyanov, I. S.
Conference Name2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Date PublishedMay 2019
PublisherIEEE
ISBN Number978-953-233-098-4
Keywordsattack vectors, Computer crime, electronic mail service, email attacks, fraud, fraudulent content, Human Behavior, human factors, machine learning, mass email infrastructures, Metrics, phishing, pubcrawl, resilience, Resiliency, risk mitigation, security defense mechanisms, security measures, Threat, threat mitigation, threats, unsolicited e-mail, virtual experiences
Abstract

Nowadays, everyone is living in a digital world with various of virtual experiences and realities, but all of them may eventually cause real threats in our real world. Some of these threats have been born together with the first electronic mail service. Some of them might be considered as really basic and simple, compared to others that were developed and advanced in time to adapt themselves for the security defense mechanisms of the modern digital world. On a daily basis, more than 238.4 billion emails are sent worldwide, which makes more than 2.7 million emails per second, and these statistics are only from the publicly visible networks. Having that information and considering around 60% and above of all emails as threatening or not legitimate, is more than concerning. Unfortunately, even the modern security measures and systems are not capable to identify and prevent all the fraudulent content that is created and distributed every day. In this paper we will cover the most common attack vectors, involving the already mass email infrastructures, the required contra measures to minimize the impact over the corporate environments and what else should be developed to mitigate the modern sophisticated email attacks.

URLhttps://ieeexplore.ieee.org/document/8757074
DOI10.23919/MIPRO.2019.8757074
Citation Keybikov_phishing_2019