Full Text

Turn on search term navigation

© 2020. This work is published under https://creativecommons.org/licenses/by-nc-nd/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Ingeniería Social, Phishing, Machine Learning, Deep Learning, Ciber Seguridad Abstract In Computer Security, it does not matter which Software or Hardware equipment is installed, because always the weakest link in this security chain, is the end user. There are several attack vectors of Social Engineering, among which stand out: fake web pages, malign messages on social networks, and malicious emails that ask for confidential information from users or even redirect users to a fake web page (Phishing). For this, first, a systematic review of the literature in the main scientific sources is carried out, to characterize and classify the different types of Phishing attacks, and subsequently, the means by which these attacks can be mitigated are exposed and classified, ranging from a user awareness to the use of Machine Learning (ML) and Deep Learning (DL) techniques. Phishing engañoso, Software malicioso, DNS o pharming, Introducción de contenidos, Man in the middle Phishing, Search Engine Phishing 1.4.

Details

Title
Caracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura
Author
Eduardo, Benavides 1 ; Walter, Fuertes 1 ; Sandra, Sanchez 1 

 Escuela Politécnica Nacional, 2Universidad de las Fuerzas Armadas 
Pages
97-104
Section
Ciencias Informáticas/Informative Sciences
Publication year
2020
Publication date
Jan-Jun 2020
Publisher
Ciencia y Tecnología from UTEQ
ISSN
13904051
e-ISSN
13904043
Source type
Scholarly Journal
Language of publication
Spanish
ProQuest document ID
2474916627
Copyright
© 2020. This work is published under https://creativecommons.org/licenses/by-nc-nd/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.