Downloads: 2 | Views: 116 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science and Information Technology | United States of America | Volume 12 Issue 8, August 2023 | Popularity: 4.7 / 10
Proactive Phishing Threat Exposure Mitigation through Adaptive Vulnerability Management: Utilizing Threat Intelligence, User Behavior Analytics, and Predictive Analytics
Santosh Kumar Kande
Abstract: Phishing remains one of the most common and effective attack methods, compromising both individual users and corporate networks. Traditional defenses like email filters and user training often fail to address how phishing campaigns exploit known and emerging vulnerabilities. This paper introduces an adaptive framework that utilizes threat intelligence, user behavior analytics (UBA), and predictive analytics to dynamically prioritize and mitigate vulnerabilities exposed to phishing campaigns. By integrating phishing threat intelligence and UBA into vulnerability management and using machine learning for predictive risk scoring, this approach offers a real - time, proactive defense against phishing - based exploits.
Keywords: Phishing, Attack Methods, Vulnerability Management, Threat Intelligence, User Behavior Analytics
Edition: Volume 12 Issue 8, August 2023
Pages: 2141 - 2561
DOI: https://www.doi.org/10.21275/SR241010075237
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 10, October 2023
Pages: 2206 - 2207Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis
Santosh Kumar Kande
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024
Pages: 1288 - 1294Unraveling Lapsus$: A Comprehensive Analysis and Insights for Strengthening Organizational Defenses
Varadharaj Varadhan Krishnan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 1, January 2023
Pages: 1273 - 1277Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection
Anvesh Gunuganti, Srikanth Mandru