Open Access Open Access  Restricted Access Subscription Access

Online Attacks: Types of Data Breach and Cyber- Attack Prevention Methods

Muhammad Ahmad Baballe, Adamu Hussaini, Mukhtar Ibrahim Bello, Usman Shuaibu Musa


Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into providing their private information. The need to look for and develop methods of detecting different threat kinds is determined by the detection of the cybersecurity (CS) state of Internet of Things (IoT) devices. In order to prevent some built-in protective mechanisms from the perspective of a possible intruder, software and hardware modifications are made easier thanks to the unification employed in the mass production of IoT devices. It becomes necessary to provide universal techniques for assessing the degree of device cybersecurity utilizing thorough methods of data analysis from both internal and external information sources.


Cybersecurity, cyberattacks, internets, cybercrime, internet of things

Full Text:



Ravi, R. (2020). A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with Cantina approach (DMLCA). Computer Communications, 153, 375–381.

Jordà, Ò., Schularick, M., & Taylor, A.M. (2016). The great mortgaging: housing finance, crises and business cycles. Economic policy, 31(85), 107–152.

Zhao, J.Y., Yan, J.Y., & Qu, J.M. (2020). Interpretations of “diagnosis and treatment protocol for novel coronavirus pneumonia (trial version 7)”. Chinese medical journal, 133(11), 1347

Zhou, H., Chen, X., Hu, T., Li, J., Song, H., Liu, Y., & Shi, W. (2020). A novel bat coronavirus closely related to SARS-CoV-2 contains natural insertions at the S1/S2 cleavage site of the spike protein. Current biology, 30(11), 2196–2203.

Wu, C., Liu, Y., Yang, Y., Zhang, P., Zhong, W., Wang, Y., ... & Li, H. (2020). Analysis of therapeutic targets for SARS-CoV-2 and discovery of potential drugs by computational methods. Acta Pharmaceutica Sinica B, 10(5), 766–788.

Aven, T. (2013). On the meaning of a black swan in a risk context. Safety science, 57, 44–51.

Vijayalakshmi, M., Shalinie, S.M., & Yang, M.H. (2020). Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. IET Networks, 9(5), 235–246.

Trisanto, D., Rismawati, N., Mulya, M.F., & Kurniadi, F.I. (2020). Effectiveness undersampling method and feature reduction in credit card fraud detection. Int. J. Intell. Eng. Syst, 13(2), 173– 181.

Rajitha, K., & VijayaLakshmi, D. (2016). Oppositional cuckoo search based weighted fuzzy rule system in malicious web sites detection from suspicious URLs. Int J Intell Eng Syst, 9(4), 116–125.

Rao, R.S., Pais, A.R., & Anand, P. (2020). A heuristic technique to detect phishing websites using TWSVM classifier. Neural Computing and Applications, 33(11), 5733–5752.

Tan, C.L., Chiew, K.L., Yong, K.S., Abdullah, J., & Sebastian, Y. (2020). A graph-theoretic approach for the detection of phishing webpages. Computers & Security, 95, 101793.

Ali, W., & Malebary, S. (2020). Particle swarm optimization-based feature weighting for improving intelligent phishing website detection. IEEE Access, 8, 116766–116780.

Aljofey, A., Jiang, Q., Qu, Q., Huang, M., & Niyigena, J.P. (2020). An effective phishing detection model based on character level convolutional neural network from URL. Electronics, 9(9), 1514.

Wei, W., Ke, Q., Nowak, J., Korytkowski, M., Scherer, R., & Woźniak, M. (2020). Accurate and fast URL phishing detector: a convolutional neural network approach. Computer Networks, 178, 107275.

Feng, J., Zou, L., Ye, O., & Han, J. (2020). Web2Vec: Phishing Webpage Detection Method Based on Multidimensional Features Driven by Deep Learning. IEEE Access, 8, 221214–221224.

Anupam, S., & Kar, A.K. (2021). Phishing website detection using support vector machines and nature inspired optimization algorithms. Telecommunication Systems, 76(1), 17–32.

Mahdavifar, S., & Ghorbani, A.A. (2020). DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Computing and Applications, 32(18), 14753–14780.

Kumar, M.S., & Indrani, B. (2021). Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. Iran Journal of Computer Science, 4(2), 85–93.

Sankhwar, S., Pandey, D., Khan, R.A., & Mohanty, S.N. (2021). An anti‐phishing enterprise environ model using feed‐forward backpropagation and Levenberg‐Marquardt method. Security and Privacy, 4(1), e132.

Tharani, J.S., & Arachchilage, N.A. (2020). Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach. Security and Privacy, 3(5), e120.

Haynes, K., Shirazi, H., & Ray, I. (2021). Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. Procedia Computer Science, 191, 127–134.

Barraclough, P.A., Fehringer, G., & Woodward, J. (2021). Intelligent cyber-phishing detection for online. Computers & Security, 104, 102123.

Leaf. 10 Ways to Prevent Cyber Attacks [Online]. Available from


  • There are currently no refbacks.

Copyright (c) 2022 Current Trends in Information Technology

  • eISSN: 2249-4707
  • ISSN: 2348-7895