The Evolution and Defense Against Social Engineering and Phishing Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 7 | Views: 115 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper | Software Engineering | India | Volume 14 Issue 5, May 2025 | Popularity: 6.1 / 10


     

The Evolution and Defense Against Social Engineering and Phishing Attacks

Sibaram Prasad Panda


Abstract: A successful security system relies on both technology and operation, however, means and methods cannot substitute for motivation and awareness. Weaknesses in security management and human factors are inevitable and bound to exist. Social engineering malware can be categorized into two types, including online and offline malware. It is believed that building the technical defenses of systems would not be sufficient to defend phishing since phishing attacks inherently booked with the strong reliance on human factors in dealing with security. Social engineering and phishing attacks continue to represent significant threats to organizations and individuals, evolving alongside advancing technology and changing social dynamics. This paper examines the historical progression of these attack vectors, analyzes current trends, and evaluates emerging defensive measures. We present a comprehensive taxonomy of modern social engineering techniques, evaluate the effectiveness of technical and human - centered defenses, and propose a multi - layered defense framework that integrates artificial intelligence, behavioral analytics, and continuous awareness training. Our findings suggest that while technical solutions provide essential protection, the most effective defense strategies combine technological measures with human - centered approaches that enhance users' ability to recognize and respond to social engineering attempts. Any attack, regardless of ideas, motifs and means, shares its dependence on manipulation of human weakness or general vulnerabilities. Malware of online phishing is based on a model of fundamental human weaknesses which can be utilized for attackers' advantage and defenders? design of countermeasures. An analysis of defense based on human weakness is proposed. Constructing social engineering attack model according to the need for Understanding Engineer Behavior in Order to Improve Defense Effectiveness.


Keywords: social engineering, phishing, cybersecurity, human factors, security awareness, cyber defense


Edition: Volume 14 Issue 5, May 2025


Pages: 397 - 408


DOI: https://www.doi.org/10.21275/SR25504223645


Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Sibaram Prasad Panda, "The Evolution and Defense Against Social Engineering and Phishing Attacks", International Journal of Science and Research (IJSR), Volume 14 Issue 5, May 2025, pp. 397-408, https://www.ijsr.net/getabstract.php?paperid=SR25504223645, DOI: https://www.doi.org/10.21275/SR25504223645

Top