Механізми та методи фішингу як першого кроку до отримання доступу

dc.contributor.authorГуда, Антон Ігоровичuk_UA
dc.contributor.authorКліщ, Сергій Михайловичuk_UA
dc.date.accessioned2023-12-03T20:09:09Z
dc.date.available2023-12-03T20:09:09Z
dc.date.issued2023
dc.descriptionА. Гуда: ORCID 0000-0003-1139-1580uk_UA
dc.description.abstractUKR: Розглянуто фішинг – техніку надсилання фішингових повідомлень. Аналіз зроблено на підставі даних у відкритому доступі. Проаналізовано процес фішингової атаки, та досліджено технічні вектори того, як користувачі стають жертвами атаки. Також розглянуто існуючі параметри фішингових атак та відповідні підходи до запобігання.uk_UA
dc.description.abstractENG: Phishing as a term that means the technique of sending phishing messages will be researched based on findings in public access and using the listed links. The process of a phishing attack will be analyzed, and then we will pay attention to the technical vectors of how users become victims of the attack. Finally, existing research on phishing attacks and related prevention approaches will be reviewed. Mitigating phishing attacks is an important research topic worth exploring. Although a lot of research has been done, this threat still exists in the real world, and its prevalence is constantly increasing. According to research results, detecting phishing attacks is a difficult problem. There are two main strategies used to mitigate phishing attacks; or improving the performance of phishing detection technology or improving people's awareness of these attacks. Developing human expertise is a key way to defeat phishing attacks, as phishing attacks exploit human weaknesses rather than network weaknesses. Also, humans are always the weakest link in social engineering attacks. Compared to phishing website detection, phishing email detection may require user involvement to achieve better detection results. Because the success of a phishing email depends on its context. Specifically, when the premise of the phishing email is consistent with the user's work context (or current situation). Most anti-phishing solutions are implemented to mitigate general phishing attacks, but they ignore some specific situations, such as advanced phishing attacks. To prevent advanced phishing attacks, phishing websites are difficult to detect if a victim is attacked using stolen DNS data because the URL content and website content are the same as legitimate websites. Most content-based approaches may not work because the content of the accessed URL is an important factor in the decision. To prevent subdomain hijacking attacks, it is difficult to detect a phishing website if the phishers have hosted the website on a subdomain taken from a legitimate website. Regardless of the web content, URL, and SSL certificate information, they will all be the same as the legitimate website. Moreover, the approach to enumeration of subdomains needs improvement, as most current tools are based on rough enumeration, existing dictionaries may not cover all instances of subdomains, as some subdomains may be meaningless.en
dc.identifier.citationГуда А. І., Кліщ С. М. Механізми та методи фішингу як першого кроку до отримання доступу. Системні технології. Дніпро, 2023. Т. 4, № 147. С. 141–154. DOI: 10.34185/1562-9945-4-147-2023-13.uk_UA
dc.identifier.doi10.34185/1562-9945-4-147-2023-13
dc.identifier.issn1562-9945 (Print)
dc.identifier.issn2707-7977 (Online)
dc.identifier.urihttps://journals.nmetau.edu.ua/index.php/st/article/view/1308en
dc.identifier.urihttps://crust.ust.edu.ua/handle/123456789/17832en
dc.language.isouk
dc.publisherУкраїнський державний університет науки і технологій, ННІ ≪Інститут промислових та бізнес технологій≫, ІВК ≪Системні технології≫, Дніпроuk_UA
dc.subjectфішингuk_UA
dc.subjectкібербезпекаuk_UA
dc.subjectбагатофакторна аутентифікаціяuk_UA
dc.subjectсоціальна інженеріяuk_UA
dc.subjectphishingen
dc.subjectcyber securityen
dc.subjectmultifactor authenticationen
dc.subjectsocial engineeringen
dc.subjectКІТСuk_UA
dc.subject.classificationSOCIAL SCIENCES::Statistics, computer and systems science::Informatics, computer and systems scienceen
dc.titleМеханізми та методи фішингу як першого кроку до отримання доступуuk_UA
dc.title.alternativePhishing Like the First Step to Gaining Accessen
dc.typeArticleen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Guda.pdf
Size:
743.4 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: