TY - JOUR
T1 - The initial socio-technical solution for phishing attack
AU - Fajar, Abdullah
AU - Yazid, Setiadi
N1 - Publisher Copyright:
© 2020 IOP Publishing Ltd. All rights reserved.
PY - 2020/6/17
Y1 - 2020/6/17
N2 - A phishing attack remains popular among security attacks, which has specific characteristics. The attacks have an impact on the economy and involve user behaviour that makes the attack successful. Many solution framework and program has developed but fails for eliminating the attack except minimizing the impact only. Mitigating and cope processes for reducing phishing attacks involve user education and training to raise higher user awareness. The mitigating process itself has two main steps that are prevention and detection. Many algorithms employ machine learning to overthrow the attack intelligently. The remaining problem of this process is detection time is slower than using blacklist filtering. The paper review social and technical aspects to conclude and identify the potential solution that will be proposed for the next stage of the research. The potential solution will include future data analytics such as an immersive and augmented analytic regardless of computing issues. An immersive and augmented analytics should have the ability to learn from the past data of user and attack behaviour to direct the system and user in combating the attacks. The learning result should give preventive suggestions and evaluate user awareness level.
AB - A phishing attack remains popular among security attacks, which has specific characteristics. The attacks have an impact on the economy and involve user behaviour that makes the attack successful. Many solution framework and program has developed but fails for eliminating the attack except minimizing the impact only. Mitigating and cope processes for reducing phishing attacks involve user education and training to raise higher user awareness. The mitigating process itself has two main steps that are prevention and detection. Many algorithms employ machine learning to overthrow the attack intelligently. The remaining problem of this process is detection time is slower than using blacklist filtering. The paper review social and technical aspects to conclude and identify the potential solution that will be proposed for the next stage of the research. The potential solution will include future data analytics such as an immersive and augmented analytic regardless of computing issues. An immersive and augmented analytics should have the ability to learn from the past data of user and attack behaviour to direct the system and user in combating the attacks. The learning result should give preventive suggestions and evaluate user awareness level.
UR - http://www.scopus.com/inward/record.url?scp=85087105833&partnerID=8YFLogxK
U2 - 10.1088/1742-6596/1502/1/012034
DO - 10.1088/1742-6596/1502/1/012034
M3 - Conference article
AN - SCOPUS:85087105833
SN - 1742-6588
VL - 1502
JO - Journal of Physics: Conference Series
JF - Journal of Physics: Conference Series
IS - 1
M1 - 012034
T2 - International Conference on Telecommunication, Electronic and Computer Engineering 2019, ICTEC 2019
Y2 - 22 October 2019 through 24 October 2019
ER -