Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
AI application framework for detecting and stopping phishing attacks for individuals
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
2025 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

The increasing number of cyberattacks have made it more important to continually develop advanced measures to combat the sophisticated tactics employed by cybercriminals. Phishing, a prevalent form of cybercrime, poses significant threats to both individuals and organizations, resulting in substantial financial and data losses. Anti-phishing applications on the market exist for organizations and businesses, but not for individuals. Thus, this paper addresses the persistent challenge of phishing attacks by proposing an AI-powered application framework aimed at identifying the necessary features to effectively prevent private individuals from becoming victims to phishing. What are the essential features required for an AI-powered PC application to effectively detect and prevent phishing attacks targeting individuals?

Through qualitative insights gathered from interviews with cybersecurity experts as well as literature research, essential features for an application for phishing prevention are identified and listed out. The list focuses on practical applications and expert-recommended strategies, aiming to integrate AI technologies to combat diverse phishing tactics effectively. The strategies include different prevention and detection techniques, for instance pop-up warnings, raising awareness and a new system dubbed “behaviour mapping.” These strategies should all be integrated in one application.

Place, publisher, year, edition, pages
2025.
Keywords [en]
phishing, AI, cybersecurity, machine learning, deep learning
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:su:diva-242634OAI: oai:DiVA.org:su-242634DiVA, id: diva2:1955525
Available from: 2025-04-30 Created: 2025-04-30

Open Access in DiVA

fulltext(1079 kB)43 downloads
File information
File name FULLTEXT01.pdfFile size 1079 kBChecksum SHA-512
548d43d7d824f0305a71b9f379c63023dcd3a155320be6964c1cda56262475b22254ca5204fa5d9ac2429fae7d096198a85e4667234cad648c9bf66cbeb4b828
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Rosén, EmmyZubarev, Erik
By organisation
Department of Computer and Systems Sciences
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 43 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 24 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf