MITIGATING THE IMPACT OF PHISHING ATTACKS ON THE E-LEARNING INFRASTRUCTURE

Authors: Mamman Ojima John, Onoja Emmanuel Oche, Enoch Blessing Toyin
Affiliation: Federal University of Agriculture Makurdi, Federal University of Technology Minna, Federal University of Lafia

Category:

Keywords: E-Learning, Phishing, cybercrime, threat, Security, Cryptography
ABSTRACT. A n essential component of the educational system is e learning. this study delves into the potential risks and threats that e learning systems face from unauthorized access by third parties and ways to protect data from unauthorized use, alteration, and reuse in a variety of e learning related circumstances, this work presents a systematic literature review on phishing techniques. it also takes mitigation techniques for phishing into account. as a result, the component and the threat posed by the information security component are presented in this study. in addition, important information security techniques for safeguarding e learning systems are suggeste d at the conclusion of this paper. today, cybercrime remains a continuous danger. this paper gives an overview of the different types of phishing attempts and how they work. we come across new forms of cybercrime every day, along with its dire repercussion s. as a result, there are numerous ways for hackers to pilfer sensitive and important data in addition to money. we also provide ideas and tactics that should be taken into account while creating mitigation plans. mitigation strategies primarily rely on hu man centric approaches, secure e learning systems, machine learning and neural networks, deep learning, and cryptography. as new phishing attacks emerge, new strategies will continue to develop to counter them.

References:

Abdillah, R., Shukur, Z., Mohd, M., & Murah, M. Z. (2022). Ph ishing classification techniques: A systematic literature review . IEEE Access , 10, 41574 41591.
Alaubaci, F. S., Almazros, A. A., & Ayub, N. (2024). Enhancing phishing detection: A novel hybrid deep learning framework for cybercrime forensics. IEEE Access , 12, 8373 8389. https://doi.org/10.1109/access.2024.3351946
Altaher, A. (2021). Intelligent ensemble learning approach for phishing website detection based on weighted soft voting. Mathematics, 9(21), 2799. https://doi.org/10.3390/math9212799
Apandi, S. H., Sallim, J., & Sidek, R. M. (2020). Types of anti phishing solutions for phishing attacks. IOP Conference Series: Materials Science and Engineering , 769,
Arshad, A., Rehman, A. U., Javaid, S., Ali, T. M., Sheikh, J. A., & Azeem, M. W. (2021). A systematic literature review on phishing and anti phishing techniques. arXiv. https://doi.org/10.48550/arXiv.2104.01255
Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications , 182(33), 27 29. https://doi.org/10.5120/ijca2018918266
Catal, C., Giray, G., Iskinenlagan, B., Kumar, S., & Shukla. (2022). Applications of deep learning for phishing detection: A systematic literature review. Knowledge and Information Systems , 64(6), 1457 1500. http s://doi.org/10.1007/s10115 022 01672
Chang, V. (2016). Review and discussion: E learning for academia and industry. International Journal of Information Management , 36(3), 476 485. https://doi.org/10.1016/j.infomgt.2015.12.007
Chanti, S., & Chithralekha , T. (2019). Classification of anti phishing solutions. SN Computer Science , 1(1). https://doi.org/10.1007/s42979 019 0011 2
Chen, S., Lu, Y. X., & Lim, D. J. (2022). Phishing target identification based on neural networks using category features and imag es. Security and Communication Networks , 2022, 1 12. https://doi.org/10.1155/2022/5653270
Chiew, K. L., Tan, C. L., Wong, K. S., Yong, K. S. C., & Trong, W. K. (2019). A new hybrid ensemble feature selection framework for machine learning based phishing d etection system. Information Sciences , 484, 153 166. https://doi.org/10.1016/j.ins.2019.01.064
Ciangaxatapu, T., Jaidhat, C. D., & Chanduka, B. (2020). Applicability of machine learning in spam and phishing email filtering: Review and approaches. Artifici al Intelligence Review , 53(7), 5019 5081. https://doi.org/10.1007/s10462 020 09814 9
Desolda, G., Ferro, L. S., Marrella, A., Catarsi, T., & Costabile, M. F. (2021). Human factors in phishing attacks: A systematic literature review. ACM Computing Surveys 54(8), 1 35. https://doi.org/10.1145/3469886
Das, A. S., Baki, A., El Aassal, & Vetm. (n.d.). Phishing research from the society perspective: A comprehensive re examination of BEE Common Surveys Tuts. Journal , 22(1), 671 704. Available at https://1911.00 953
Dima, A., Bugheanu, A. M., Boghian, R., & Madsen, D. O. (2022). Mapping knowledge area analysis in e learning systems based on cloud computing. Electronics, 12(1), 62. https://doi.org/10.3390/electronics12010062
Drzani, M. (2014). Securing e learning platforms. 2014 International Conference on Web and Open Access to Learning (ICWOAL), Dubai, United Arab Emirates , 1 4. https://doi.org/10.1109/ICWOAL.2014.7009237
Eze, S. C., Chinedu Ere, V. C., & Belle, A. O. (2018). The utilisation of e learning facil ities in the educational delivery system of Nigeria: A study of M University. International Journal of Educational Technology in Higher Education , 15(1). https://doi.org/10.1186/41239 2018 0116 2
Ennu, G., Martes, M., & Boratto, L. (2018). A multi brometn e system for continuous student authentication in e learning platforms. Pattern Recognition Letters , 113, 83 92. https://doi.org/10.1016/j.patrec.2017.03.027
Ibrahim, H., Karabatak, S., & Abdullahi, A. A. (2020). A study on cybersecurity challenges in e l earning and database management systems. 2020 8th International Symposium on Digital Forensics and Security (ISDFS) ISDFS). https://doi.org/10.1109/isdfs49300.2020.9116415
Li, T., Kou, G., & Peng, Y. (2020). Improving malicious URLs detection via feature enginee ring: Linear and nonlinear space transformation methods. Information Systems , 91, 101494. https://doi.org/10.1016/j.is.2020.101494
Luminita, D. C. (2011). Information security in e learning platforms. Procedia Social and Behavioral Sciences , 15, 2689 26 93. https://doi.org/10.1016/j.sbspro.2011.04.171
Muutode, A. R., & Parwe, S. S. (2019). An overview on phishing, its types and countermeasures. International Journal of Engineering Research and Technology , 8(12). https://doi.org/10.17577/ijertv8is120260
Nadeem, M., Zahra, S., Abbasi, M., Arshad, A., Riaz, S., & Ahmed, W. (2023). Phishing attack, its detections and prevention techniques. International Journal of Wireless Information Networks. https://doi.org/10.37591/gwan
Ozcan, A., Catal, C., Demmez, E., & Senturk, B. (2023). A hybrid DNN LSTM model for detecting phishing URLs. Neural Computing & Applications , 35, 4957 4973. https://doi.org/10.1007/s00521 02
Prosen, M., Kamuž, I., & Ličen, S. (2022). Evaluation of e learning experience among health and a llied health professions students during the COVID 19 pandemic in Slovenia: An instrument development and validation study. International Journal of Environmental Research and Public Health , 19(8), 4777. https://doi.org/10.3390/ijerph19084777
Safi, A., & Singh, S. (2013). A systematic literature review on phishing website detection techniques. Journal of King Saud University Computer and Information Sciences , 35(2), 590 611. https://doi.org/10.1016/j.jksuci.2025.01.004
Sallaum, A., Gaber, T., Vaderz, & Shaalan, K. (2022). A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access , 10, 65703 65727. https://doi.org/10.1109/access.2022.3183083 8918286