International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 116 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science and Information Technology | United States of America | Volume 12 Issue 8, August 2023 | Popularity: 4.7 / 10


     

Proactive Phishing Threat Exposure Mitigation through Adaptive Vulnerability Management: Utilizing Threat Intelligence, User Behavior Analytics, and Predictive Analytics

Santosh Kumar Kande


Abstract: Phishing remains one of the most common and effective attack methods, compromising both individual users and corporate networks. Traditional defenses like email filters and user training often fail to address how phishing campaigns exploit known and emerging vulnerabilities. This paper introduces an adaptive framework that utilizes threat intelligence, user behavior analytics (UBA), and predictive analytics to dynamically prioritize and mitigate vulnerabilities exposed to phishing campaigns. By integrating phishing threat intelligence and UBA into vulnerability management and using machine learning for predictive risk scoring, this approach offers a real - time, proactive defense against phishing - based exploits.


Keywords: Phishing, Attack Methods, Vulnerability Management, Threat Intelligence, User Behavior Analytics


Edition: Volume 12 Issue 8, August 2023


Pages: 2141 - 2561


DOI: https://www.doi.org/10.21275/SR241010075237



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Santosh Kumar Kande, "Proactive Phishing Threat Exposure Mitigation through Adaptive Vulnerability Management: Utilizing Threat Intelligence, User Behavior Analytics, and Predictive Analytics", International Journal of Science and Research (IJSR), Volume 12 Issue 8, August 2023, pp. 2141-2561, https://www.ijsr.net/getabstract.php?paperid=SR241010075237, DOI: https://www.doi.org/10.21275/SR241010075237



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 10, October 2023

Pages: 2206 - 2207

Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis

Santosh Kumar Kande

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024

Pages: 1288 - 1294

Unraveling Lapsus$: A Comprehensive Analysis and Insights for Strengthening Organizational Defenses

Varadharaj Varadhan Krishnan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 1, January 2023

Pages: 1273 - 1277

Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection

Anvesh Gunuganti, Srikanth Mandru

Share this Article



Top