2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) 2021
DOI: 10.1109/icaccs51430.2021.9441925
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Cyber Crime and Phishing Attacks with Machine Learning: A Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…In their comparative study, Bhowmik, Chandana, and Rudra et al [13] state that the decision tree is the most accurate model for detecting phishing attacks compared to the other models based on the naïve Bayes classifier. Arshey and Viji [14] published their work on thwarting security issues in blockchain environments with machine-learning solutions. Their work was more theoretical but had many practical applications, such as COVID-19 data storage and cloud technology.…”
Section: Traditional Machine-learning Approachesmentioning
confidence: 99%
“…In their comparative study, Bhowmik, Chandana, and Rudra et al [13] state that the decision tree is the most accurate model for detecting phishing attacks compared to the other models based on the naïve Bayes classifier. Arshey and Viji [14] published their work on thwarting security issues in blockchain environments with machine-learning solutions. Their work was more theoretical but had many practical applications, such as COVID-19 data storage and cloud technology.…”
Section: Traditional Machine-learning Approachesmentioning
confidence: 99%
“…As anticipated, the majority of technical countermeasures to phishing attacks is based on machine learning. As such, the main goal of the work discussed in [ 108 ] was to identify and propose ways in which machine learning techniques could be deployed for the detection of diverse types of cyber‐crimes, such as phishing, identify theft, hacking, distributed denial of service, email bombing, and digital stalking. Authors discussed different types of machine learning‐based implementations in cyber‐crime mitigation, including the discussion of ways in which machine learning could contribute to phishing detection, with particular reference to the detection of phishing emails via analysis of the headers and body of the emails.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Authors discussed different types of machine learning-based implementations in cyber-crime mitigation, including the discussion of ways in which machine learning could contribute to phishing detection, with particular reference to the detection of phishing emails via analysis of the headers and body of the emails. The techniques proposed in [108] are effectively used in the following systems. In [86], the authors introduced a novel AI-based anomalous email detector -HOLMES -that can effectively tackle the challenge of anomalous email detection.…”
Section: Work Proposing Technical Solutionsmentioning
confidence: 99%
“…Overall, cybercrime remains a global issue, and researchers and experts are constantly proposing new ideas and strategies to combat this evolving threat. The widespread adoption of technology and the growth of the digital era have created both opportunities and risks, and it is crucial to stay vigilant and employ effective cybersecurity measures to protect against cyber-attacks [2].…”
Section: Introductionmentioning
confidence: 99%