You are on page 1of 2

c

Communication Media  Human misdirection


Target ATTACK Techniques
 Counter Measurements
Social networking
__}
\K\_
_
Deep Lea rning
Email Attack Launching

 E-mail spoofing Deep neural-network


Feed-forward deep neural-network
1. Attachments Recurrent neural-network
2. Abusing social setting Convolutional neural-network
3. URLs spoofing Restricted Boltzmann machine
Messenger
Deep belief network
 Website spoofing Deep auto-encoder
 Intelligent voice reaction
Blogs & forums
 Collaboration in social
networks r Machine Le arning
 Reverse social
engineering  Support Vector M achine
 Man in the middle Random Forest
Voice over  Spear phishing  C4.5
Internet Protocol  Spoofed mobile internet  CART
Decision Tree
 Adaboost
k-NN
Data Gathering

 Fake
Websites forms
r Scenario based

 Key loggers  Identity detection process


 Recorded  Logo Extraction
messages  Dark traid attacke is concept
 62000 employers over 6 weeks
browsers Installed web content of observation
 Worked on 985 p articipants
r Hybrid Techniques

 Heuristic Rule & Logistic Regression


 EKRV Model
 Stacking
 Voting

You might also like