WSEAS Transactions on Computers
Print ISSN: 1109-2750, E-ISSN: 2224-2872
Volume 22, 2023
How to Understand Phishing
Author:
Abstract: The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.
Search Articles
Pages: 1-6
DOI: 10.37394/23205.2023.22.1