Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...
Saved in:
| 主要作者: | |
|---|---|
| 其他作者: | , , |
| 格式: | article |
| 语言: | spa |
| 出版: |
2020
|
| 主题: | |
| 在线阅读: | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 |
| 标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
| _version_ | 1859126171763998720 |
|---|---|
| author | Benavides , Eduardo |
| author2 | Fuertes, Walter Sanchez , Sandra Nuñez-Agurto, Daniel |
| author2_role | author author author |
| author_facet | Benavides , Eduardo Fuertes, Walter Sanchez , Sandra Nuñez-Agurto, Daniel |
| author_role | author |
| collection | Revista Ciencia y Tecnología |
| dc.creator.none.fl_str_mv | Benavides , Eduardo Fuertes, Walter Sanchez , Sandra Nuñez-Agurto, Daniel |
| dc.date.none.fl_str_mv | 2020-06-30 |
| dc.format.none.fl_str_mv | application/pdf text/html |
| dc.identifier.none.fl_str_mv | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 10.18779/cyt.v13i1.357 |
| dc.language.none.fl_str_mv | spa |
| dc.publisher.none.fl_str_mv | Universidad Técnica Estatal de Quevedo |
| dc.relation.none.fl_str_mv | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/407 https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/409 |
| dc.rights.none.fl_str_mv | Derechos de autor 2020 Ciencia y Tecnología info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | Ciencia y Tecnología; Vol. 13 No. 1 (2020): Science and Technology Journal - January - June 2020; 97-104 Ciencia y Tecnología; Vol. 13 Núm. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104 Ciencia y Tecnología; v. 13 n. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104 1390-4043 1390-4051 10.18779/cyt.v13i1 reponame:Revista Ciencia y Tecnología instname:Universidad Técnica Estatal de Quevedo instacron:UTEQ |
| dc.subject.none.fl_str_mv | Ingeniería Social Phishing Machine Learning Deep Learning Ciber Seguridad Social Engineering Phishing Machine Learning Deep Learning Cybersecurity |
| dc.title.none.fl_str_mv | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature Caracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
| description | In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly from the users,with the purpose of using this information againstthemselves. There are several attack vectors of SocialEngineering, among which stand out: fake web pages,malign messages on social networks, and maliciousemails that ask for confidential information from usersor even redirect users to a fake web page (Phishing).The objective of this paper is to provide end users andother researchers with a look at the types of Phishingattacks that exist, and how they can be mitigated. Forthis, first, a systematic review of the literature in themain scientific sources is carried out, to characterizeand classify the different types of Phishing attacks, andsubsequently, the means by which these attacks can bemitigated are exposed and classified, ranging from auser awareness to the use of Machine Learning (ML)and Deep Learning (DL) techniques. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | REVCYT_a5cad417aaa0b52de78a8bc5df415e2b |
| identifier_str_mv | 10.18779/cyt.v13i1.357 |
| instacron_str | UTEQ |
| institution | UTEQ |
| instname_str | Universidad Técnica Estatal de Quevedo |
| language | spa |
| network_acronym_str | REVCYT |
| network_name_str | Revista Ciencia y Tecnología |
| oai_identifier_str | oai:revistas.uteq.edu.ec:article/357 |
| publishDate | 2020 |
| publisher.none.fl_str_mv | Universidad Técnica Estatal de Quevedo |
| reponame_str | Revista Ciencia y Tecnología |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | Revista Ciencia y Tecnología - Universidad Técnica Estatal de Quevedo |
| repository_id_str | |
| rights_invalid_str_mv | Derechos de autor 2020 Ciencia y Tecnología |
| spelling | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The LiteratureCaracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literaturaBenavides , EduardoFuertes, WalterSanchez , SandraNuñez-Agurto, DanielIngeniería SocialPhishingMachine LearningDeep LearningCiber SeguridadSocial EngineeringPhishingMachine LearningDeep LearningCybersecurityIn Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly from the users,with the purpose of using this information againstthemselves. There are several attack vectors of SocialEngineering, among which stand out: fake web pages,malign messages on social networks, and maliciousemails that ask for confidential information from usersor even redirect users to a fake web page (Phishing).The objective of this paper is to provide end users andother researchers with a look at the types of Phishingattacks that exist, and how they can be mitigated. Forthis, first, a systematic review of the literature in themain scientific sources is carried out, to characterizeand classify the different types of Phishing attacks, andsubsequently, the means by which these attacks can bemitigated are exposed and classified, ranging from auser awareness to the use of Machine Learning (ML)and Deep Learning (DL) techniques.En la Seguridad Informática, no importa queequipamiento de Software o Hardware se tengainstalado, porque siempre el eslabón más débil en estacadena de seguridad es el usuario final. De esta premisase valen los diferentes tipos de ataque de IngenieríaSocial, cuyo objetivo principal es obtener informacióncasi directamente de los usuarios, con la finalidad deusar esta información en contra de ellos mismos.Existen varios vectores de ataque de Ingeniería Social,entre los que sobresalen: páginas web falsificadas,mensajes malignos en redes sociales, y correos malignosque piden información confidencial de los usuarios oincluso pueden redireccionar a los usuarios a una páginaweb falsificada (Phishing). El objetivo de este trabajo esproveer a los usuarios finales y a otros investigadores,una visión de los tipos de ataques de Phishing existentesy de cómo estos pueden ser mitigados. Para esto,primeramente, se realiza una revisión sistemática dela literatura en las principales fuentes científicas, paracaracterizar y clasificar los diferentes tipos de ataquede ingeniería social, y posteriormente, se exponen yclasifican los medios por los que estos ataques puedenser mitigados, que van desde la concientización alusuario, hasta la utilización de técnicas de MachineLearning y Deep LearningUniversidad Técnica Estatal de Quevedo2020-06-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.uteq.edu.ec/index.php/cyt/article/view/35710.18779/cyt.v13i1.357Ciencia y Tecnología; Vol. 13 No. 1 (2020): Science and Technology Journal - January - June 2020; 97-104Ciencia y Tecnología; Vol. 13 Núm. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-104Ciencia y Tecnología; v. 13 n. 1 (2020): Revista Ciencia y Tecnología Enero - Junio 2020; 97-1041390-40431390-405110.18779/cyt.v13i1reponame:Revista Ciencia y Tecnologíainstname:Universidad Técnica Estatal de Quevedoinstacron:UTEQspahttps://revistas.uteq.edu.ec/index.php/cyt/article/view/357/407https://revistas.uteq.edu.ec/index.php/cyt/article/view/357/409Derechos de autor 2020 Ciencia y Tecnologíainfo:eu-repo/semantics/openAccess2021-03-03T02:10:51Zoai:revistas.uteq.edu.ec:article/357Portal de revistashttps://revistas.uteq.edu.ec/index.php/cytUniversidad públicahttps://www.uteq.edu.ecEcuadorCiencia y tecnología1390-40431390-4043opendoar:2021-03-03T02:10:51falsePortal de revistashttps://revistas.uteq.edu.ec/index.php/cytUniversidad públicahttps://www.uteq.edu.ecEcuadorCiencia y tecnología1390-40431390-4043opendoar:2021-03-03T02:10:51Revista Ciencia y Tecnología - Universidad Técnica Estatal de Quevedofalse |
| spellingShingle | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature Benavides , Eduardo Ingeniería Social Phishing Machine Learning Deep Learning Ciber Seguridad Social Engineering Phishing Machine Learning Deep Learning Cybersecurity |
| status_str | publishedVersion |
| title | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| title_full | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| title_fullStr | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| title_full_unstemmed | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| title_short | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| title_sort | Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature |
| topic | Ingeniería Social Phishing Machine Learning Deep Learning Ciber Seguridad Social Engineering Phishing Machine Learning Deep Learning Cybersecurity |
| url | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 |