Spear-Phishing campaigns: Link Vulnerability leads to phishing attacks, Spear-Phishing electronic/UAV communication-scam targeted

M. S. Baig, Faisal Ahmed, Ali Mobin Memon
{"title":"Spear-Phishing campaigns: Link Vulnerability leads to phishing attacks, Spear-Phishing electronic/UAV communication-scam targeted","authors":"M. S. Baig, Faisal Ahmed, Ali Mobin Memon","doi":"10.1109/ICCIS54243.2021.9676394","DOIUrl":null,"url":null,"abstract":"One of the most important strategies for gaining unauthentic early access to some person/company's computing resources/data is spear phishing. Phishing is, at its core, a sort of social engineering intended to persuade a user to give sensitive information or run a payload that will infect their system. Spear phishing is a type of phishing in which bogus emails are sent to specific businesses with the goal of obtaining confidential information. A successful phishing campaign necessitates the use of a few different resources as well as some setup. Impersonation, inducement, and access- control bypass techniques are among its approaches. In this paper we have studied and found up to date approaches to spear phishing attacks and their preventative measures. The paper also demonstrates the steps to set up and run successful phishing campaign and the results astonishingly shows that even only personality-targeted messaging can alter the response to phishing attacks. As a result of learning the facts, the paper suggests that users should seek to improve their security awareness by becoming familiar with the warning signs of phishing attacks. Moreover, more often in Unmanned Aerial Vehicles (UAV) or drones (which are now being used in various domains including military operations, monitoring, etc.), the resources are deployed as web services which makes them vulnerable to phishing activities. A data mining technique is also suggested as a tool for the detection of phishing attacks in UAVs.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIS54243.2021.9676394","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

One of the most important strategies for gaining unauthentic early access to some person/company's computing resources/data is spear phishing. Phishing is, at its core, a sort of social engineering intended to persuade a user to give sensitive information or run a payload that will infect their system. Spear phishing is a type of phishing in which bogus emails are sent to specific businesses with the goal of obtaining confidential information. A successful phishing campaign necessitates the use of a few different resources as well as some setup. Impersonation, inducement, and access- control bypass techniques are among its approaches. In this paper we have studied and found up to date approaches to spear phishing attacks and their preventative measures. The paper also demonstrates the steps to set up and run successful phishing campaign and the results astonishingly shows that even only personality-targeted messaging can alter the response to phishing attacks. As a result of learning the facts, the paper suggests that users should seek to improve their security awareness by becoming familiar with the warning signs of phishing attacks. Moreover, more often in Unmanned Aerial Vehicles (UAV) or drones (which are now being used in various domains including military operations, monitoring, etc.), the resources are deployed as web services which makes them vulnerable to phishing activities. A data mining technique is also suggested as a tool for the detection of phishing attacks in UAVs.
鱼叉式网络钓鱼活动:链接漏洞导致网络钓鱼攻击,鱼叉式网络钓鱼电子/无人机通信诈骗目标
获得对某人/公司的计算资源/数据的不真实的早期访问权的最重要的策略之一是鱼叉式网络钓鱼。从本质上讲,网络钓鱼是一种社会工程,旨在说服用户提供敏感信息或运行感染其系统的有效载荷。鱼叉式网络钓鱼是一种网络钓鱼,向特定企业发送虚假电子邮件,目的是获取机密信息。成功的网络钓鱼活动需要使用一些不同的资源以及一些设置。模拟、诱导和访问控制旁路技术是其方法之一。在本文中,我们研究并发现了最新的鱼叉式网络钓鱼攻击方法及其预防措施。本文还演示了建立和运行成功的网络钓鱼活动的步骤,结果令人惊讶地表明,即使只有针对个性的信息也可以改变对网络钓鱼攻击的反应。通过了解这些事实,本文建议用户应该通过熟悉网络钓鱼攻击的警告信号来提高他们的安全意识。此外,更常见的是,在无人驾驶飞行器(UAV)或无人机(现在用于军事行动、监控等各种领域)中,资源被部署为web服务,这使得它们容易受到网络钓鱼活动的攻击。本文还提出了一种数据挖掘技术作为检测无人机网络钓鱼攻击的工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信