Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2293
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nair, Adarsh S V | - |
dc.contributor.author | Achary, Rathnakar | - |
dc.date.accessioned | 2023-12-09T08:56:05Z | - |
dc.date.available | 2023-12-09T08:56:05Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | pp. 1-5 | en_US |
dc.identifier.isbn | 9781665456272 | - |
dc.identifier.uri | https://doi.org/10.1109/ICAIA57370.2023.10169678 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2293 | - |
dc.description.abstract | One of the weakest links in any security system is neither the devices used nor the programs running on them; but the human beings using these devices. Most cyberattacks are initiated by human error. Hackers always use the most accessible and effective social engineering techniques to attack. Simply put, it is the art of manipulating people into sharing sensitive and confidential information. This research proposes a framework with four modules, namely, a source analyzer, a content classifier and analyzer, a link analyzer, and a risk reporting module, as a social engineering defender system for categorizing the risks before the email reaches the inbox of the user. Before it reaches the end user's inbox, the system blocks the emails the social engineering defender has marked as 'very high risk'. © 2023 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2023 International Conference on Artificial Intelligence and Applications, ICAIA 2023 and Alliance Technology Conference, ATCON-1 2023 | en_US |
dc.subject | human emotions | en_US |
dc.subject | phishing attack | en_US |
dc.subject | risk analysis | en_US |
dc.subject | risk reporting | en_US |
dc.subject | risk score | en_US |
dc.subject | social engineering | en_US |
dc.title | Social Engineering Defender (Se.Def): Human Emotion Factor Based Classification and Defense Against Social Engineering Attacks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.