Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …

Awareness of phishing attacks in the public sector: Review types and technical approaches

MF Alghenaim, NAA Bakar, FA Rahim - International Conference on …, 2022 - Springer
Today, phishing attempts are a major problem and a significant cyber risk. Phishing is one of
the most common ways attackers try to steal money on the Internet. Phishing attacks can …

D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks

S Freitas, A Wicker, DH Chau, J Neil - Proceedings of the 2020 SIAM …, 2020 - SIAM
Given a large enterprise network of devices and their authentication history (eg, device
logons), how can we quantify network vulnerability to lateral attack and identify at-risk …

The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company

P Burda, AM Altawekji, L Allodi… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Phishing attacks are increasingly more sophisticated, with attackers exploiting publicly
available information on their targets to personalize their attacks. Although an increasing …

[PDF][PDF] A literature reviewon sniffing attacks in computernetwork

A Kulshrestha, SK Dubey - International Journal of Advanced …, 2014 - academia.edu
In today's modern era, the internet plays very important role among communications of
various stakeholders. Internet creates a link between client and server. But the interface …

[PDF][PDF] YALIH, yet another low interaction honeyclient

M Mansoori, I Welch, Q Fu - … of the Twelfth …, 2014 - crpit.scem.westernsydney.edu.au
Low-interaction honeyclients employ static detection techniques such as signatures,
heuristic or anomaly detection in the identification of malicious websites. They are …

TypoWriter: a tool to prevent typosquatting

I Ahmad, MA Parvez, A Iqbal - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
Typosquatting is a form of internet cybersquatting generated from the mistakes (typos) made
by internet users while ty** a website address. It often leads the user to another …

Dbdhunter: an ensemble-based anomaly detection approach to detect drive-by download attacks

M Jodavi, M Abadi, E Parhizkar - 2015 5th International …, 2015 - ieeexplore.ieee.org
Drive-by download attacks, typically implemented in JavaScript, are among the most
common attack vectors in recent years. To confront these attacks, several anomaly detection …