The unprecedented outbreak of covid-19 globally has sent panic and fear worldwide. Therefore, all institutions had to shut down so that individual states could find the best way to forge forward to understand the extent of the pandemic (Gerald, 2020). Once testing of the various was tested, there was a transmission of the virus at a community level. Therefore, government institutions and private institutions decided to operate from home. Therefore, this leads to installing Wi-Fi and the application of remote desktop control in doing their jobs.
Although remote work had many challenges, which was even more detrimental as data conveyed would transmit data packets from one to another that could be susceptible to attacks by the digital assailant. Reports have demonstrated during covid19era, that voluminous attacks took place which was approximated to 245,771 phishing attacks in only one month. This was reported by the Anti-phishing working group (APWG). The UK’s HMRC demonstrated that 73% raise in email phishing attacks in the covid-19 era (Hamdani, 2021).
The research was animated by the rising number of phishing attacks during the covid19era. The level of phishing attacks was minimal before covid. By considering this fact, therefore was needed to understand what the sudden cause of this kind of phenomenon is.
The research attempts to solve What are the factors that trigger the upsurge of phishing attacks in the covid 19 situation? When covid-19 struck, there was fear about what it was and its adaptability to avoid shrinking the economy. Adopting online services has increased the surface area of attacks as fake phishing websites could be sent to individuals, hence infiltrating personal information.
To mitigate the problem identified and review through literature review, data from open-source websites such as phishtank was downloaded. The downloaded data was used to devise a model that will help us identify the causes of attacks in covid 19 era. Additionally, the Microsoft threat modeling tool will be used to establish the veracity of the in anticipation of mitigating the problem domain.
This paper will contribute a lot to determining how to deal with fear and our data records during the ravaging pandemic.
The following are some of the critical aspects that the paper will articulate.
Phishing attacks have existed for a long time, especially in social engineering mechanisms. The identity of an individual is stolen through duping (Thomas, 2020). Various mechanism has been applied to eradicate and detect phishing attacks.
Pattern matching filters have become a salient technique in detecting malware. Site data and URLs are matched with certain data contained in our recommender system (Collins et al., 2021). If it matches, it will be identified that the cause of attack had been used there before. A technique of pattern matching has been proposed by scholars such as (Rahamathunnisa et al., 2017). in analyzing malicious patterns of phishing attacks.
Important work has been carried out to establish how attacks using URLs have been carried out and demonstrated by a number of scholars how phishing URLs can be determined (Azeez et al., 2021, p.102328). The key element is extracted from the URL, such as the natural language process, and a prediction is made (Somesha, 2020). This was achieved by training the model and using a random classifier to predict the causes of attacks.
The application of content-based to predict the causes of phishing attacks as opposed to the earlier URL mechanism (Ozker, 2020). This mechanism has demonstrated better performance than other methods of determining phishing attacks (Mao et al., 2019). This method focused on entirety analyzing the content of the page and the metadata of the search engines.
The application of AdaBoost and multi-boost to detect phishing websites are used by the researcher for comparison purposes such that they ensemble learners to improve the presentation and calculations (Mallick et al., p.28). It is noted that once this classifier is used in research, it will improve precision.
Deep learning, which is the concept of artificial intelligence, has been used in modeling many things in the computing field, and phishing attack detection is not an exception (Sarker et al., 2021). Deep machine learning has been used in simulating intrusion detection systems (Mathews,2019, p.1269). The figure below illustrates forecasting of phishing attacks or legal traffic, a batch of input data that is supplied to the neurons and given weights (Basit et al.,2021,p.144).
The proposal for the development of an intelligent phishing detection system is a system used to classify the site as either legitimate or a phishing website (Yadollahi et al., 2019). The application of unique machine learning models in predicting all these. The mechanism applied the use of random forest in classification in order to enhance the F-score and accuracy of the model in attacks determination (Sahingoz, 2020).
Comparative analysis studies will be conducted in a bid to answer the research questions which will be analyzed using content analysis. Moreover, experimental designs will also be carried out such as the decision tree algorithm, and Microsoft threat analysis tool.
The upsurge of covid-19 has been on the rise and has created a lot of concerns through which individual data has been stolen through phishing attacks.
To mitigate the causes of attacks, a model will be developed such that we can be able to predict what the causes of attacks are. This will be implemented by the development of a decision-tree algorithm that will be used to train the model and test the data (Charbuty, 2021).
A Microsoft threat analysis tool will be used, to model the causes of attacks and possible mitigation strategies to enhance the security of our data from phishing assaults.
These are the approaches going to undertake in order to perform prediction which is achieved using a decision tree algorithm.
Task |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
Literature review |
|||||||||||||||
Requirements Gathering |
|||||||||||||||
Research methods. |
|||||||||||||||
Analysis, experimental, and Findings (Model simulation, training, and testing) |
|||||||||||||||
Results, Discussion, and conclusion |
|||||||||||||||
Appendix and references |
|||||||||||||||
Project presentation |
This research will not involve any other persons except the supervisor who provides the guidance and other required support. There is no disclosing of collected personal data. This research has no public financial support, and data will be collected from open-source free websites and research journals.
I am totally aware of and comply with the classification as stated in the ethics form that is provided by my university.
References:
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download