Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » SE attacks

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Awareness model for minimizing the effects of social engineering attacks in web applications Pages 791-800 Right click to download the paper Download PDF

Authors: Maher Al-Khateeb, Mohammad Rasmi Al-Mousa, Ala’a Saeb Al-Sherideh, Dmaithan Almajali, Mahmoud Asassfeha, Hayel Khafajeh

DOI: 10.5267/j.ijdns.2023.1.010

Keywords: Social Engineering, Cybercrime, Malicious code, Attacks, SE attacks

Abstract:
Social Engineering (SE) Attacks against information systems continue to pose a potentially devastating impact. Security information systems are becoming increasingly significant as the number of SE incidents rapidly increased and became more aggressive than before. The World Wide Web (WWW) has evolved for information exchange and knowledge-sharing. It enables the sharing of information in a timely, effective, and transparent manner. Identity theft and identity misuse are two sides of cybercrime in which hackers and fraudulent users collect sensitive information from current legal users in order to perform fraud or deceit for financial gain. Malicious links are used as phishing methods, in which malicious links are planted beneath legitimate-looking links. As the number of web pages grows, the number of malicious web pages and the attacks of such become more complex. In this paper, we provide a method for identifying malicious web pages using a crawling and classification approach that helps to support the automatic discovery of the malicious links. The proposed approach can successfully complete the crawling session even if the page requires partial page refreshment and authentication credentials. The evaluation of the proposed approach shows a higher accuracy compared to an existing approach with an overall accuracy of 72% in three custom applications. Moreover, the proposed approach will calculate the significance and the impact severances of each link on the website and it better differentiates malicious web pages and normal links. The results of the proposed approach will also help in providing a set of recommendations which can increase the awareness level of the end-users, website administrators on how to better deal with these types of SE attacks.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1663 | Reviews: 0

 

® 2010-2026 GrowingScience.Com