Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature

In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Benavides , Eduardo (author)
مؤلفون آخرون: Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author)
التنسيق: article
اللغة:spa
منشور في: 2020
الموضوعات:
الوصول للمادة أونلاين:https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1859126171763998720
author Benavides , Eduardo
author2 Fuertes, Walter
Sanchez , Sandra
Nuñez-Agurto, Daniel
author2_role author
author
author
author_facet Benavides , Eduardo
Fuertes, Walter
Sanchez , Sandra
Nuñez-Agurto, Daniel
author_role author
collection Revista Ciencia y Tecnología
dc.creator.none.fl_str_mv Benavides , Eduardo
Fuertes, Walter
Sanchez , Sandra
Nuñez-Agurto, Daniel
dc.date.none.fl_str_mv 2020-06-30
dc.format.none.fl_str_mv application/pdf
text/html
dc.identifier.none.fl_str_mv https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
10.18779/cyt.v13i1.357
dc.language.none.fl_str_mv spa
dc.publisher.none.fl_str_mv Universidad Técnica Estatal de Quevedo
dc.relation.none.fl_str_mv https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/407
https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/409
dc.rights.none.fl_str_mv Derechos de autor 2020 Ciencia y Tecnología
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv Ciencia y Tecnología; Vol. 13 No. 1 (2020): Science and Technology Journal - January - June 2020; 97-104
Ciencia y Tecnología; Vol. 13 Núm. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104
Ciencia y Tecnología; v. 13 n. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104
1390-4043
1390-4051
10.18779/cyt.v13i1
reponame:Revista Ciencia y Tecnología
instname:Universidad Técnica Estatal de Quevedo
instacron:UTEQ
dc.subject.none.fl_str_mv Ingeniería Social
Phishing
Machine Learning
Deep Learning
Ciber Seguridad
Social Engineering
Phishing
Machine Learning
Deep Learning
Cybersecurity
dc.title.none.fl_str_mv Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
Caracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
description In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly from the users,with the purpose of using this information againstthemselves. There are several attack vectors of SocialEngineering, among which stand out: fake web pages,malign messages on social networks, and maliciousemails that ask for confidential information from usersor even redirect users to a fake web page (Phishing).The objective of this paper is to provide end users andother researchers with a look at the types of Phishingattacks that exist, and how they can be mitigated. Forthis, first, a systematic review of the literature in themain scientific sources is carried out, to characterizeand classify the different types of Phishing attacks, andsubsequently, the means by which these attacks can bemitigated are exposed and classified, ranging from auser awareness to the use of Machine Learning (ML)and Deep Learning (DL) techniques.
eu_rights_str_mv openAccess
format article
id REVCYT_a5cad417aaa0b52de78a8bc5df415e2b
identifier_str_mv 10.18779/cyt.v13i1.357
instacron_str UTEQ
institution UTEQ
instname_str Universidad Técnica Estatal de Quevedo
language spa
network_acronym_str REVCYT
network_name_str Revista Ciencia y Tecnología
oai_identifier_str oai:revistas.uteq.edu.ec:article/357
publishDate 2020
publisher.none.fl_str_mv Universidad Técnica Estatal de Quevedo
reponame_str Revista Ciencia y Tecnología
repository.mail.fl_str_mv
repository.name.fl_str_mv Revista Ciencia y Tecnología - Universidad Técnica Estatal de Quevedo
repository_id_str
rights_invalid_str_mv Derechos de autor 2020 Ciencia y Tecnología
spelling Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The LiteratureCaracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literaturaBenavides , EduardoFuertes, WalterSanchez , SandraNuñez-Agurto, DanielIngeniería SocialPhishingMachine LearningDeep LearningCiber SeguridadSocial EngineeringPhishingMachine LearningDeep LearningCybersecurityIn Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly from the users,with the purpose of using this information againstthemselves. There are several attack vectors of SocialEngineering, among which stand out: fake web pages,malign messages on social networks, and maliciousemails that ask for confidential information from usersor even redirect users to a fake web page (Phishing).The objective of this paper is to provide end users andother researchers with a look at the types of Phishingattacks that exist, and how they can be mitigated. Forthis, first, a systematic review of the literature in themain scientific sources is carried out, to characterizeand classify the different types of Phishing attacks, andsubsequently, the means by which these attacks can bemitigated are exposed and classified, ranging from auser awareness to the use of Machine Learning (ML)and Deep Learning (DL) techniques.En la Seguridad Informática, no importa queequipamiento de Software o Hardware se tengainstalado, porque siempre el eslabón más débil en estacadena de seguridad es el usuario final. De esta premisase valen los diferentes tipos de ataque de IngenieríaSocial, cuyo objetivo principal es obtener informacióncasi directamente de los usuarios, con la finalidad deusar esta información en contra de ellos mismos.Existen varios vectores de ataque de Ingeniería Social,entre los que sobresalen: páginas web falsificadas,mensajes malignos en redes sociales, y correos malignosque piden información confidencial de los usuarios oincluso pueden redireccionar a los usuarios a una páginaweb falsificada (Phishing). El objetivo de este trabajo esproveer a los usuarios finales y a otros investigadores,una visión de los tipos de ataques de Phishing existentesy de cómo estos pueden ser mitigados. Para esto,primeramente, se realiza una revisión sistemática dela literatura en las principales fuentes científicas, paracaracterizar y clasificar los diferentes tipos de ataquede ingeniería social, y posteriormente, se exponen yclasifican los medios por los que estos ataques puedenser mitigados, que van desde la concientización alusuario, hasta la utilización de técnicas de MachineLearning y Deep LearningUniversidad Técnica Estatal de Quevedo2020-06-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.uteq.edu.ec/index.php/cyt/article/view/35710.18779/cyt.v13i1.357Ciencia y Tecnología; Vol. 13 No. 1 (2020): Science and Technology Journal - January - June 2020; 97-104Ciencia y Tecnología; Vol. 13 Núm. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104Ciencia y Tecnología; v. 13 n. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-1041390-40431390-405110.18779/cyt.v13i1reponame:Revista Ciencia y Tecnologíainstname:Universidad Técnica Estatal de Quevedoinstacron:UTEQspahttps://revistas.uteq.edu.ec/index.php/cyt/article/view/357/407https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/409Derechos de autor 2020 Ciencia y Tecnologíainfo:eu-repo/semantics/openAccess2021-03-03T02:10:51Zoai:revistas.uteq.edu.ec:article/357Portal de revistashttps://revistas.uteq.edu.ec/index.php/cytUniversidad públicahttps://www.uteq.edu.ecEcuadorCiencia y tecnología1390-40431390-4043opendoar:2021-03-03T02:10:51falsePortal de revistashttps://revistas.uteq.edu.ec/index.php/cytUniversidad públicahttps://www.uteq.edu.ecEcuadorCiencia y tecnología1390-40431390-4043opendoar:2021-03-03T02:10:51Revista Ciencia y Tecnología - Universidad Técnica Estatal de Quevedofalse
spellingShingle Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
Benavides , Eduardo
Ingeniería Social
Phishing
Machine Learning
Deep Learning
Ciber Seguridad
Social Engineering
Phishing
Machine Learning
Deep Learning
Cybersecurity
status_str publishedVersion
title Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
title_full Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
title_fullStr Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
title_full_unstemmed Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
title_short Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
title_sort Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
topic Ingeniería Social
Phishing
Machine Learning
Deep Learning
Ciber Seguridad
Social Engineering
Phishing
Machine Learning
Deep Learning
Cybersecurity
url https://revistas.uteq.edu.ec/index.php/cyt/article/view/357