数据冗余、数据钓鱼、数据云备份

M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao
{"title":"数据冗余、数据钓鱼、数据云备份","authors":"M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao","doi":"10.1109/ICECCT56650.2023.10179679","DOIUrl":null,"url":null,"abstract":"Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Redundancy, Data Phishing, and Data Cloud Backup\",\"authors\":\"M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao\",\"doi\":\"10.1109/ICECCT56650.2023.10179679\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.\",\"PeriodicalId\":180790,\"journal\":{\"name\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCT56650.2023.10179679\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179679","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

今天的数据是极其复杂和庞大的。考虑到这些因素,机器学习和ETL技术将会更容易将有用的数据从不可用的原始数据中分离出来。在web技术中,OLTP和OLAP用于日常操作数据。在事务期间,在数据库或数据仓库中维护大量数据。过去没有云存储来备份数据。由于互联网使用量的显著增加,人们在网上分享了更多的个人信息。网络犯罪分子现在可以访问大量的个人数据和金融活动。网络钓鱼是一种非常有效的网络犯罪类型,它允许罪犯欺骗用户并获取关键数据。自从1990年第一个已知实例发布以来,网络钓鱼已经发展成为一种更复杂的攻击媒介。现在最常见的网络诈骗类型之一是网络钓鱼。网络钓鱼攻击会给受害者造成严重的损失,包括窃取机密信息、身份、企业和国家机密。本文通过解决现有的网络钓鱼技术和讨论网络钓鱼的当前状态来评估这些攻击。在研究中,基于常见的网络钓鱼方法和防御手段对网络钓鱼攻击进行分类,忽略了整个网络钓鱼生命周期的重要性。本文提供了一个新的、深入的网络钓鱼攻击剖析模型,包括攻击阶段、攻击者类型、威胁、目标、攻击媒体和攻击策略。建议的生理学也将帮助读者了解网络钓鱼攻击的生命周期,这将有助于开发全面的反网络钓鱼系统。这将提高公众对网络钓鱼攻击及其使用方法的认识。提出了新的途径,并探讨了一些预防措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Data Redundancy, Data Phishing, and Data Cloud Backup
Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model of Markovian Queue with Catastrophe, Restoration and Balking Nibble Based Two Bit Invert Coding Technique for Serial Network on Chip Links Hesitant Triangular Fuzzy Dombi Operators and Its Applications Fuel Cost Optimization of Coal-Fired Power Plants using Coal Blending Proportions An Efficient Classification for Light Motor Vehicles using CatBoost Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1