A Comprehensive Analysis of Social Engineering Attacks: From Phishing to Prevention - Tools, Techniques and Strategies

被引:0
作者
Gupta, Sarthak [1 ]
Pritwani, Mayank [1 ]
Shrivastava, Adarsh [1 ]
Mohana [1 ]
Moharir, Minal [1 ]
Kumar, Ashok A. R. [1 ]
机构
[1] RV Coll Engn, Comp Sci & Engn Cyber Secur, Bengaluru, India
来源
2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024 | 2024年
关键词
Social Engineering; Cybersecurity; Phishing; Security Policies; Information Security;
D O I
10.1109/ICOICI62503.2024.10696444
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the digitalization has accelerated, Social Engineering Attacks have emerged as a prevalent threat in contemporary cybersecurity landscapes. This paper provides a comprehensive exploration of Social Engineering Attacks, encompassing their phases, types, and associated tools for simulation and defense across Windows and Linux platforms. Furthermore, it analyzes the role of Artificial Intelligence in both detecting and combating Social Engineering Attacks, highlighting its applications and implications. Additionally, the paper addresses design and implementation challenges inherent in combating such attacks and discusses crucial precautions that users must undertake to safeguard themselves against these evolving threats.
引用
收藏
页码:42 / 49
页数:8
相关论文
共 18 条
  • [1] Abubaker A. A., 2023, INT S NETW COMP COMM
  • [2] Al-Thani N. A., 2022, INT C BEH SOC COMP B
  • [3] Bishnoi Ayush, 2023, 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), P681, DOI 10.1109/ICSSIT55814.2023.10061054
  • [4] Chetioui K., 2022, Proc. Comput. Sci., V198, P656, DOI 10.1016/j.procs.2021.12.302
  • [5] Dharani V., 2023, 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), P1104, DOI 10.1109/ICSSIT55814.2023.10060908
  • [6] Gupta S, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P537, DOI 10.1109/CCAA.2016.7813778
  • [7] Leonov P. Y., 2021, URAL S BIOM ENG RAD
  • [8] Mouton F., 2013, Social engineering from a normative ethics perspective
  • [9] Mouton F, 2014, INFO SECUR S AFR
  • [10] Parthy PP, 2019, INT CARN CONF SECU