Phishing

This is one of the most common and successful (from an attacker's perspective) attacks on the applications. Most of the time, the attacker sends an email or some kind of familiar communication to the user to trick him/her into following the URL and providing the credentials. The idea is to make the user believe that the message is genuine. The attacker, at times, creates a dummy but identical web page which the user is familiar with and finds no reason to suspect the genuineness. Once the user clicks the URL, some malicious software gets downloaded to the machine and starts accessing information over the connected networks.

These attacks can be prevented by using machine learning algorithms. The user's email headers and content can ...

Get Artificial Intelligence for Big Data now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.