How AI is Used to Combat Social Engineering Attacks — Part 2
Last Updated on July 25, 2023 by Editorial Team
Author(s): John Adeojo
Originally published on Towards AI.
An Analysis of AI Approaches to Counteract URL Phishing
Image by Author: Generated with Midjourney
In the first part of this series, we briefly touched on the prevalence and costliness of social engineering attacks focusing primarily on phishing. We explored the traditional, policy-based strategies for preventing such attacks, before turning our attention to more innovative, AI-driven techniques.
To this end, we examined two scholarly papers that present machine learning-based strategies for detecting phishing. Both studies utilized shallow ML models, with most of the performance gains coming from the efforts to engineer more informative features.
Despite the promise of these ML approaches, we must also acknowledge their limitations. The need for manual feature… Read the full blog for free on Medium.
Join thousands of data leaders on the AI newsletter. Join over 80,000 subscribers and keep up to date with the latest developments in AI. From research to projects and ideas. If you are building an AI startup, an AI-related product, or a service, we invite you to consider becoming a sponsor.
Published via Towards AI