International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 11 | Nov 2022
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
Cyber Threat Prediction using ML Submitted by – Shubham Paikrao, Simranjot Singh Manan, Hrushikesh Jagtap, Shyam Anumalla (Students of VPPCOE&VA, Mumbai) ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - Businesses have long prioritized cybersecurity, but despite expenditures in security procedures and technology,
cyberattacks continue to plague all sectors of industry. Cybercriminals have been busy improving their craft over the years, according to evaluations of occurrences, which has led to an increase in cybersecurity incidents overall. The main cybercrime, phishing, needs to be stopped by taking specific safeguards. Phishing is a type of social engineering in which an attacker delivers a false communication intended to deceive a person into giving the attacker critical information or installing harmful software, such as ransomware, on the victim's infrastructure. Phishing attempts are becoming increasingly complex, and many of them replicate the targeted website, enabling the attacker to observe everything the victim does there and to cross any further security barriers with them.
Key Words: Cyber security, cyber attacks, phishing, cybercrime, social engineering, security 1. INTRODUCTION Web users today are susceptible to a variety of cyberattacks, including phishing. Phishing is a type of cyberattack that uses social engineering to trick unsuspecting internet users into disclosing personal information such as usernames, passwords, credit card numbers, and other sensitive data by pretending to be a trustworthy website or by sending a malicious URL in an email. Phishing is an online fraud through which a phisher gains unauthorized access to the user system to lure personal credentials (such as username, password, credit/debit card number, validity, CVV number, and pin) for financial gain. Assaults known as "phishing" incorporate conveying misleading correspondences that appear to be from a solid source. It is usually done through email. The intention is to either steal personal information like credit card numbers and login credentials or infect the victim's computer with malware. Everyone should educate themselves about phishing, a widespread form of cyberattack, to defend themselves. Attackers could be happy to get the credit card number or other personal data from a victim in exchange for cash. Other times, phishing emails are sent to gather employee login credentials or other information for use in a sophisticated attack on a particular firm. Phishing is frequently used as the first step in cybercrime assaults like ransomware and advanced persistent threats (APTs). Phishing has grown significantly in volume over time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in the number of attempts to cheat internet users, both businesses and private ones. 1.1 Aims & Objectives
To detect phishing and take required precautions to prevent phishing To prepare and launch public awareness campaigns to prevent cybercrimes. To investigate phishing cases
1.2 Working of Phishing Attack
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 295