SlideShare a Scribd company logo
A Literature Review
Spammers have discovered that short message communication technologies, such as mobile and
microblogging social networks, are ideal platforms for disseminating unsolicited content (add
here reference 1). They have suggested a unified architecture that uses Twitter and mobile data
as test samples to detect spam messages and spam accounts. This paper investigated a bio-inspired
evolutionary search strategy to find a minimum number of attributes for spam account detection
on Twitter.
Apart from the developers' principal purposes, the Internet is in ubiquitous growth as a vital
component of daily social activities, and users are continually exposed to online risks. Such
vulnerabilities could result in the loss of crucial financial and personal data, as well as identity
theft in e-commerce (add reference 2). They have proposed a phishing website detection method
that combines a feature selection strategy with a meta-heuristic-based nonlinear regression
algorithm. This study has used two feature selection methods: decision tree and wrapper. Harmony
search (HS), which uses a nonlinear regression technique, and support vector machine, which uses
a support vector machine (SVM). The parameters of the suggested regression model were
produced using the HS technique, and the nonlinear regression approach was utilized to classify
the websites.
(add reference 3) stated that smartphone threats have evolved into one of the most significant
cyberspace risks; as a result, several commercial and academic solutions have been developed to
counter these threats. They have presented two injection techniques: benign permissions injection
and benign permissions-code injection. To produce disguised datasets based on a well-known
harmful dataset, the proposed injection assaults were combined with another technique termed app
re-signing attack.
Every electronic message has the potential to be a phishing attempt. If recipients misjudge the
threat, they risk identity theft, ransomware, malware, or worse for themselves and anyone
connected to them (add reference 4). If recipients overestimate the threat, they may pay
unnecessary expenses, which may reduce their willingness and ability to respond in the long run.
"Cognition about cognition" is how metacognition was defined in their study. It referred to people's
perceptions about their capacity to identify phishing emails.
Phishing is an online scam in which a phisher gains unauthorized access to a user's system to obtain
personal information in exchange for money. Phishing can be done in a variety of methods,
including through emails, phone calls, instant chats, adverts, and popups on websites, as well as
DNS poisoning, add reference 5. The research technique for this study was a full classification of
anti-phishing solutions. The purpose of this classification was to give a general overview of anti-
phishing solutions as well as the amount of research done in this field.
According to (add reference 6 here) the number of ransomware attacks has risen considerably in
recent years. Because the number of ransomware variations is growing, signature and heuristic-
based detection techniques are becoming more difficult to perform. In an attempt to characterize
all versions of each ransomware family into one model, they have constructed a prediction model
of ransomware. The process entailed constructing a safe environment to analyze the ransomware
samples as well as developing a classifier. In addition to this model, they have conducted a user
study to gain a better understanding of the ransomware deployment process.
Phishing is one of the most serious security risks on the Internet today. In this attack, the user
enters sensitive information like as credit card numbers, passwords, and other personal information
into a false website that appears to be legitimate add reference 7. This study proposed a novel
method for detecting phishing attacks by analyzing hyperlinks in the website's HTML source code.
To detect phishing attacks, the suggested technique added several unique and remarkable
hyperlink-specific properties. The proposed method split hyperlink-specific information into 12
categories and used these categories to train machine learning algorithms.
Reference 8 has stated that due to its widespread use, social media has become a common medium
for malevolent users known as social spammers to bombard regular users with undesirable content.
On social media, detecting spammers is always a difficult task. They have proposed a new
spammer classification method based on the LDA (Latent Dirichlet Allocation) topic model. Their
approach captured the spamming essence by retrieving both global and local data regarding topic
distribution patterns. One benchmark dataset and one self-gathered data set were used to test the
approach. In terms of average FI-score, this proposed approach surpasses previous state-of-the-art
approaches.
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in
accurately detecting intrusions add here reference 9. Failure to prevent the intrusions could
degrade the credibility of security services, e.g. data confidentiality, integrity, and
availability. AIDS methods can be categorized into three main groups: Statistics-based,
knowledge-based, and machine learning-based. A statistics-based IDS built a distribution model
for normal behavior profiles, then detected low probability events and flags them as potential
intrusions. Statistical AIDS essentially took into account the statistical metrics such as the
median, mean, mode, and standard deviation of packets.
According to the reference 10 ransomware is a type of complex and upgraded harmful software
that appears as Crypto or Locker and is designed to assault and take control of basic infrastructures
and computer systems. The great majority of these threats are designed to extract money from
victims. The research methodology section explained the procedures taken to review previous
work in the field of ransomware attacks and detection systems. They have also gone through how
the previous studies were chosen using a set of inclusion and exclusion criteria.
Phishing is a type of internet crime that involves collecting confidential information such as
passwords, account numbers, and credit card numbers stated in reference 11. Their study was
primarily focused on improving the system's ability to detect phishing websites. They have broken
down processes and procedures into the phases; Dataset selection, Comprehending the Dataset,
Training and cross-validation, Machine-learning algorithms with GAs for classification, and
classification without the use of GAs utilizing machine-learning techniques.
According to reference 12 contrary to popular belief, the Mac ecosystem is not unaffected by
malware. In 2014, the first known ransomware appeared. Mitigating anti-debugging techniques
were introduced by Apple which have two standard methods to detect and prevent applications
from being attacked by debuggers. Sysctl() retrieves information about a process and determines
its debugging status.

More Related Content

Similar to Literature Review.docx

6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
PravinKshirsagar11
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
ijistjournal
 
Clustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security ApplicationsClustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security Applications
IJSTA
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
CSCJournals
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
CSCJournals
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
IRJET Journal
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
IJARBEST JOURNAL
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
IJCNCJournal
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
IJCNCJournal
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
rakhicse
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
Alexander Decker
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Jeremiah Grossman
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
IJECEIAES
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
IJERA Editor
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
Katie Naple
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
Dr. Amarjeet Singh
 
Anti-Phishing Phil
Anti-Phishing PhilAnti-Phishing Phil
Anti-Phishing Phil
Jasmine Dixon
 

Similar to Literature Review.docx (20)

6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
Clustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security ApplicationsClustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security Applications
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
Anti-Phishing Phil
Anti-Phishing PhilAnti-Phishing Phil
Anti-Phishing Phil
 
Research Report
Research ReportResearch Report
Research Report
 

Recently uploaded

Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Masters European & Gapanese Auto Repair
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
ahmedendrise81
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
mymwpc
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
Bertini's German Motors
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
Import Motorworks
 
What Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop WorkingWhat Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop Working
Lancer Service
 
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdfPARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
eduarddorda1010
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
Strategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls RoyceStrategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls Royce
SadmanFuad1
 
Regeneration of Diesel Particulate Filter in Automobile
Regeneration of Diesel Particulate Filter in AutomobileRegeneration of Diesel Particulate Filter in Automobile
Regeneration of Diesel Particulate Filter in Automobile
AtanuGhosh62
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
Perth City Skoda
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
jennifermiller8137
 
One compartment Model Deliverdddddded.pdf
One compartment Model Deliverdddddded.pdfOne compartment Model Deliverdddddded.pdf
One compartment Model Deliverdddddded.pdf
RehanRustam2
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
Dart Auto
 

Recently uploaded (20)

Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
 
What Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop WorkingWhat Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop Working
 
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdfPARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
Strategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls RoyceStrategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls Royce
 
Regeneration of Diesel Particulate Filter in Automobile
Regeneration of Diesel Particulate Filter in AutomobileRegeneration of Diesel Particulate Filter in Automobile
Regeneration of Diesel Particulate Filter in Automobile
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
 
One compartment Model Deliverdddddded.pdf
One compartment Model Deliverdddddded.pdfOne compartment Model Deliverdddddded.pdf
One compartment Model Deliverdddddded.pdf
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
 

Literature Review.docx

  • 1. A Literature Review Spammers have discovered that short message communication technologies, such as mobile and microblogging social networks, are ideal platforms for disseminating unsolicited content (add here reference 1). They have suggested a unified architecture that uses Twitter and mobile data as test samples to detect spam messages and spam accounts. This paper investigated a bio-inspired evolutionary search strategy to find a minimum number of attributes for spam account detection on Twitter. Apart from the developers' principal purposes, the Internet is in ubiquitous growth as a vital component of daily social activities, and users are continually exposed to online risks. Such vulnerabilities could result in the loss of crucial financial and personal data, as well as identity theft in e-commerce (add reference 2). They have proposed a phishing website detection method that combines a feature selection strategy with a meta-heuristic-based nonlinear regression algorithm. This study has used two feature selection methods: decision tree and wrapper. Harmony search (HS), which uses a nonlinear regression technique, and support vector machine, which uses a support vector machine (SVM). The parameters of the suggested regression model were produced using the HS technique, and the nonlinear regression approach was utilized to classify the websites. (add reference 3) stated that smartphone threats have evolved into one of the most significant cyberspace risks; as a result, several commercial and academic solutions have been developed to counter these threats. They have presented two injection techniques: benign permissions injection and benign permissions-code injection. To produce disguised datasets based on a well-known harmful dataset, the proposed injection assaults were combined with another technique termed app re-signing attack. Every electronic message has the potential to be a phishing attempt. If recipients misjudge the threat, they risk identity theft, ransomware, malware, or worse for themselves and anyone connected to them (add reference 4). If recipients overestimate the threat, they may pay unnecessary expenses, which may reduce their willingness and ability to respond in the long run. "Cognition about cognition" is how metacognition was defined in their study. It referred to people's perceptions about their capacity to identify phishing emails. Phishing is an online scam in which a phisher gains unauthorized access to a user's system to obtain personal information in exchange for money. Phishing can be done in a variety of methods, including through emails, phone calls, instant chats, adverts, and popups on websites, as well as DNS poisoning, add reference 5. The research technique for this study was a full classification of anti-phishing solutions. The purpose of this classification was to give a general overview of anti- phishing solutions as well as the amount of research done in this field.
  • 2. According to (add reference 6 here) the number of ransomware attacks has risen considerably in recent years. Because the number of ransomware variations is growing, signature and heuristic- based detection techniques are becoming more difficult to perform. In an attempt to characterize all versions of each ransomware family into one model, they have constructed a prediction model of ransomware. The process entailed constructing a safe environment to analyze the ransomware samples as well as developing a classifier. In addition to this model, they have conducted a user study to gain a better understanding of the ransomware deployment process. Phishing is one of the most serious security risks on the Internet today. In this attack, the user enters sensitive information like as credit card numbers, passwords, and other personal information into a false website that appears to be legitimate add reference 7. This study proposed a novel method for detecting phishing attacks by analyzing hyperlinks in the website's HTML source code. To detect phishing attacks, the suggested technique added several unique and remarkable hyperlink-specific properties. The proposed method split hyperlink-specific information into 12 categories and used these categories to train machine learning algorithms. Reference 8 has stated that due to its widespread use, social media has become a common medium for malevolent users known as social spammers to bombard regular users with undesirable content. On social media, detecting spammers is always a difficult task. They have proposed a new spammer classification method based on the LDA (Latent Dirichlet Allocation) topic model. Their approach captured the spamming essence by retrieving both global and local data regarding topic distribution patterns. One benchmark dataset and one self-gathered data set were used to test the approach. In terms of average FI-score, this proposed approach surpasses previous state-of-the-art approaches. Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions add here reference 9. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. AIDS methods can be categorized into three main groups: Statistics-based, knowledge-based, and machine learning-based. A statistics-based IDS built a distribution model for normal behavior profiles, then detected low probability events and flags them as potential intrusions. Statistical AIDS essentially took into account the statistical metrics such as the median, mean, mode, and standard deviation of packets. According to the reference 10 ransomware is a type of complex and upgraded harmful software that appears as Crypto or Locker and is designed to assault and take control of basic infrastructures and computer systems. The great majority of these threats are designed to extract money from victims. The research methodology section explained the procedures taken to review previous work in the field of ransomware attacks and detection systems. They have also gone through how the previous studies were chosen using a set of inclusion and exclusion criteria.
  • 3. Phishing is a type of internet crime that involves collecting confidential information such as passwords, account numbers, and credit card numbers stated in reference 11. Their study was primarily focused on improving the system's ability to detect phishing websites. They have broken down processes and procedures into the phases; Dataset selection, Comprehending the Dataset, Training and cross-validation, Machine-learning algorithms with GAs for classification, and classification without the use of GAs utilizing machine-learning techniques. According to reference 12 contrary to popular belief, the Mac ecosystem is not unaffected by malware. In 2014, the first known ransomware appeared. Mitigating anti-debugging techniques were introduced by Apple which have two standard methods to detect and prevent applications from being attacked by debuggers. Sysctl() retrieves information about a process and determines its debugging status.