{"id":1837,"date":"2023-03-02T00:18:09","date_gmt":"2023-03-02T00:18:09","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1520"},"modified":"2023-03-02T00:18:09","modified_gmt":"2023-03-02T00:18:09","slug":"hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/","title":{"rendered":"Hat\u00e9kony t\u00f6bbf\u00e1zis\u00fa adathal\u00e1sz weboldal-\u00e9szlel\u00e9si modell"},"content":{"rendered":"<p>A phishing a leggyakoribb m\u00f3dszer, amellyel a kiberb\u0171n\u00f6z\u0151k ma inform\u00e1ci\u00f3kat lopnak, \u00e9s ez a kiberfenyeget\u00e9s egyre rosszabb\u00e1 v\u00e1lik, mivel egyre t\u00f6bb jelent\u00e9s \u00e9rkezik az adatv\u00e9delmi sziv\u00e1rg\u00e1sokr\u00f3l \u00e9s a p\u00e9nz\u00fcgyi vesztes\u00e9gekr\u0151l, amelyeket ez a fajta kibert\u00e1mad\u00e1s okoz. Fontos szem el\u0151tt tartani, hogy az ODS phishing-\u00e9szlel\u00e9si m\u00f3dja nem teljesen vizsg\u00e1lja meg, mi teszi a phishinget m\u0171k\u00f6d\u0151k\u00e9pess\u00e9.<\/p>\n\n\n\n<p>Emellett az \u00e9szlel\u00e9si modellek csak kev\u00e9s adatcsomagon m\u0171k\u00f6dnek j\u00f3l. Jav\u00edt\u00e1sra szorulnak, miel\u0151tt a val\u00f3s webk\u00f6rnyezetben haszn\u00e1lhat\u00f3k lenn\u00e9nek. Emiatt a felhaszn\u00e1l\u00f3k \u00faj m\u00f3dszereket szeretn\u00e9nek a phishing weboldalak gyors \u00e9s pontos felismer\u00e9s\u00e9re. Ehhez a szoci\u00e1lis m\u00e9rn\u00f6ki elvek \u00e9rdekes pontokat k\u00edn\u00e1lnak, amelyek felhaszn\u00e1lhat\u00f3k hat\u00e9kony m\u00f3dszerek kidolgoz\u00e1s\u00e1ra a phishing oldalak k\u00fcl\u00f6nb\u00f6z\u0151 szakaszokban t\u00f6rt\u00e9n\u0151 felismer\u00e9s\u00e9re, k\u00fcl\u00f6n\u00f6sen a val\u00f3s weben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-history-of-phishing\">A phishing t\u00f6rt\u00e9nete<\/h2>\n\n\n<p>Ne feledje, hogy a phishing a szoci\u00e1lis m\u00e9rn\u00f6ki t\u00e1mad\u00e1sok egyik gyakori t\u00edpusa, ami azt jelenti, hogy a hackerek az emberek term\u00e9szetes \u00f6szt\u00f6neit, bizalm\u00e1t, f\u00e9lelm\u00e9t \u00e9s kapzsis\u00e1g\u00e1t haszn\u00e1lj\u00e1k ki, hogy r\u00e1vegy\u00e9k \u0151ket rossz dolgok elk\u00f6vet\u00e9s\u00e9re. A kiberbiztons\u00e1gi kutat\u00e1sok azt mutatj\u00e1k, hogy <a href=\"https:\/\/cyware.com\/news\/phishing-attacks-increase-350-percent-amid-covid-19-quarantine-5b95d3ca\" target=\"_blank\" rel=\"noreferrer noopener\">a phishing 350%-val n\u0151tt a COVID-19 karant\u00e9n alatt<\/a>. \u00dagy gondolj\u00e1k, hogy a phishing k\u00f6lts\u00e9ge most a hagyom\u00e1nyos kibert\u00e1mad\u00e1sok k\u00f6lts\u00e9g\u00e9nek 1\/4-e, de a bev\u00e9tel k\u00e9tszerese a m\u00faltbelinek. A phishing t\u00e1mad\u00e1sok \u00e1tlagosan $1,6 milli\u00f3 doll\u00e1rba ker\u00fclnek a k\u00f6zepes m\u00e9ret\u0171 v\u00e1llalkoz\u00e1soknak, mert ez a kiberfenyeget\u00e9s megk\u00f6nny\u00edti az \u00fcgyfelek elveszt\u00e9s\u00e9t, mint megszerz\u00e9s\u00e9t.<\/p>\n\n\n\n<p>A phishing t\u00e1mad\u00e1sok k\u00fcl\u00f6nb\u00f6z\u0151k\u00e9ppen n\u00e9zhetnek ki, \u00e9s \u00e1ltal\u00e1ban sz\u00e1mos kommunik\u00e1ci\u00f3s m\u00f3dot haszn\u00e1lnak, p\u00e9ld\u00e1ul e-mailt, sz\u00f6veges \u00fczeneteket \u00e9s k\u00f6z\u00f6ss\u00e9gi m\u00e9di\u00e1t. F\u00fcggetlen\u00fcl att\u00f3l, hogy melyik csatorn\u00e1t haszn\u00e1lj\u00e1k, a t\u00e1mad\u00f3k gyakran ismert bankoknak, hitelk\u00e1rtya-t\u00e1rsas\u00e1goknak vagy e-kereskedelmi oldalaknak adj\u00e1k ki magukat, hogy megijessz\u00e9k a felhaszn\u00e1l\u00f3kat, \u00e9s r\u00e1vegy\u00e9k \u0151ket, hogy bejelentkezzenek a phishing oldalra, \u00e9s olyan dolgokat tegyenek, amelyeket k\u00e9s\u0151bb megb\u00e1nnak, vagy k\u00e9nyszer\u00edts\u00e9k \u0151ket erre.<\/p>\n\n\n\n<p>P\u00e9ld\u00e1ul egy felhaszn\u00e1l\u00f3 \u00fajra kaphat egy azonnali \u00fczenetet, amely szerint probl\u00e9ma van a banksz\u00e1ml\u00e1j\u00e1val, \u00e9s egy webes linkre ir\u00e1ny\u00edtj\u00e1k, amely nagyon hasonl\u00edt a bank \u00e1ltal haszn\u00e1lt linkre. A felhaszn\u00e1l\u00f3 nem gondolkodik k\u00e9tszer, miel\u0151tt be\u00edrja felhaszn\u00e1l\u00f3nev\u00e9t \u00e9s jelszav\u00e1t a b\u0171n\u00f6z\u0151 \u00e1ltal megadott mez\u0151kbe. A b\u0171n\u00f6z\u0151 feljegyzi az inform\u00e1ci\u00f3it, amelyeket azt\u00e1n felhaszn\u00e1l a felhaszn\u00e1l\u00f3 munkamenet\u00e9nek el\u00e9r\u00e9s\u00e9hez.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-be-improved-in-antiphising-methods\">Mit kellene jav\u00edtani az Antiphishing m\u00f3dszerekben?<\/h2>\n\n\n<p>Ahhoz, hogy erre a k\u00e9rd\u00e9sre v\u00e1laszoljunk, meg kell \u00e9rten\u00fcnk a tipikus phishing folyamatot, amelyet a k\u00f6vetkez\u0151 \u00e1bra mutat be.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/What-should-be-improved-in-Antiphising-methods-1-1024x466.jpg\" alt=\"Mit kellene jav\u00edtani az Antiphishing m\u00f3dszerekben?\" class=\"wp-image-1519\" width=\"769\" height=\"349\"\/><\/figure>\n\n\n\n<p>A jelenlegi mainstream antiphishing m\u00f3dszer a g\u00e9pi tanul\u00e1son alapul\u00f3 phishing weboldal-\u00e9szlel\u00e9s. Ez az online \u00e9szlel\u00e9si m\u00f3d, amely statisztikai tanul\u00e1son alapul, az els\u0151dleges antiphishing m\u00f3dszer; azonban a robusztuss\u00e1g\u00e1t \u00e9s hat\u00e9konys\u00e1g\u00e1t a bonyolult webk\u00f6rnyezetekben jav\u00edtani kell. Az al\u00e1bbiakban \u00f6sszefoglaljuk a g\u00e9pi tanul\u00e1son alapul\u00f3 antiphishing m\u00f3dszerek f\u0151bb probl\u00e9m\u00e1it.<\/p>\n\n\n\n<p>\u2022 Az antiphishing m\u00f3dszerek egyre t\u00f6bb jellemz\u0151t t\u00e1vol\u00edtanak el, de nem vil\u00e1gos, mi\u00e9rt t\u00e1vol\u00edtj\u00e1k el ezeket a jellemz\u0151ket. A megl\u00e9v\u0151 jellemz\u0151k nem t\u00fckr\u00f6zik pontosan a phishing term\u00e9szet\u00e9t, amely az \u00e9rz\u00e9keny inform\u00e1ci\u00f3k ellop\u00e1s\u00e1ra haszn\u00e1lja a megt\u00e9veszt\u00e9st. Ennek eredm\u00e9nyek\u00e9nt a funkci\u00f3k csak n\u00e9h\u00e1ny korl\u00e1tozott \u00e9s specifikus forgat\u00f3k\u00f6nyvben v\u00e1lnak \u00e9rv\u00e9nyess\u00e9, p\u00e9ld\u00e1ul specifikus adatcsomagokban vagy b\u00f6ng\u00e9sz\u0151b\u0151v\u00edtm\u00e9nyben.<\/p>\n\n\n\n<p>\u2022 A megl\u00e9v\u0151 algoritmusok minden weboldalt ugyan\u00fagy kezelnek, ami a statisztikai modellt hat\u00e1stalann\u00e1 teszi. M\u00e1s sz\u00f3val, a modellek nem alkalmasak a val\u00f3s webk\u00f6rnyezetben val\u00f3 haszn\u00e1latra, ahol nagysz\u00e1m\u00fa bonyolult weboldal tal\u00e1lhat\u00f3.<\/p>\n\n\n\n<p>\u2022 A legt\u00f6bb adatcsomagban nincs elegend\u0151 minta, \u00e9s a mint\u00e1k sokf\u00e9les\u00e9g\u00e9t nem veszik figyelembe. Emellett a pozit\u00edv \u00e9s negat\u00edv mint\u00e1k ar\u00e1nya nem re\u00e1lis. \u00c1ltal\u00e1ban az ilyen t\u00edpus\u00fa adatcsomagokb\u00f3l \u00e9p\u00edtett modellek sok t\u00faltanul\u00e1st tartalmaznak, \u00e9s a modellek robusztuss\u00e1g\u00e1t jav\u00edtani kell.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-has-been-the-advance-in-antiphishing-methods\">Milyen el\u0151rel\u00e9p\u00e9s t\u00f6rt\u00e9nt az Antiphishing m\u00f3dszerekben?<\/h2>\n\n\n<p>Az elm\u00falt n\u00e9h\u00e1ny \u00e9vben pr\u00f3b\u00e1ltak kidolgozni egy nagyszab\u00e1s\u00fa, megb\u00edzhat\u00f3 \u00e9s hat\u00e9kony antiphishing m\u00f3dszert, amely a val\u00f3s webk\u00f6rnyezetben m\u0171k\u00f6dik. Ez a m\u00f3dszer statisztikai g\u00e9pi tanul\u00e1si algoritmusokon alapul, amelyeket a k\u00f6vetkez\u0151 tesztek jav\u00edtanak:<\/p>\n\n\n\n<p>\u2022 A phishing t\u00e1mad\u00e1sok mint\u00e1zat\u00e1nak r\u00e9szletes elemz\u00e9s\u00e9vel statisztikai funkci\u00f3kat tal\u00e1lni az antiphishinghez. A jelenlegi modellek a \u201chamis\u00edt\u00e1s\u201d, \u201ckapcsol\u00f3d\u00e1s\u201d, \u201clop\u00e1s\u201d \u00e9s \u201c\u00e9rt\u00e9kel\u00e9s\u201d funkci\u00f3kat vonj\u00e1k ki. Ezeket nevezik <a href=\"https:\/\/www.ibm.com\/docs\/SSTTDS_11.0.0\/com.ibm.etools.mft.doc\/ak05600_.html#:~:text=CASE%20is%20a%20complex%20function,the%20path%20of%20subsequent%20processing.\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cCASE\u201d funkci\u00f3knak<\/a>. Ez a modell bemutatja, hogyan haszn\u00e1lj\u00e1k a szoci\u00e1lis m\u00e9rn\u00f6ki m\u00f3dszereket a phishing t\u00e1mad\u00e1sokban, \u00e9s mennyire relev\u00e1ns \u00e9s j\u00f3 a tartalom a weben. A CASE modell figyelembe veszi, hogy a megt\u00e9veszt\u00e9s a phishing r\u00e9sze, biztos\u00edtja, hogy a jellemz\u0151k megk\u00fcl\u00f6nb\u00f6ztethet\u0151k \u00e9s \u00e1ltal\u00e1nos\u00edthat\u00f3k legyenek, \u00e9s t\u00e1mogat\u00e1st ny\u00fajt a jellemz\u0151k szintj\u00e9n a hat\u00e9kony phishing \u00e9szlel\u00e9shez.<\/p>\n\n\n\n<p>\u2022 Mivel a legitim \u00e9s a phishing weboldalak nem rendelkeznek azonos mennyis\u00e9g\u0171 forgalommal, a jelenlegi \u00e9szlel\u00e9si modellek t\u00f6bbl\u00e9pcs\u0151s biztons\u00e1gi rendszeren alapulnak. A t\u00f6bbl\u00e9pcs\u0151s \u00e9szlel\u00e9si modellek m\u00f6g\u00f6tt az az elk\u00e9pzel\u00e9s \u00e1ll, hogy biztos\u00edts\u00e1k a \u201cgyors sz\u0171r\u00e9st \u00e9s pontos felismer\u00e9st\u201d. A gyors sz\u0171r\u00e9si szakaszban a legitim weboldalakat kisz\u0171rik. Ezut\u00e1n pontos fel\u00fcgyelt felismer\u00e9st v\u00e9geznek, konkr\u00e9t pozit\u00edv \u00e9s negat\u00edv mint\u00e1k tanul\u00e1s\u00e1val egy kisebb tartom\u00e1nyban. Ez az \u00e9szlel\u00e9si filoz\u00f3fia biztos\u00edtja a magas teljes\u00edtm\u00e9nyt r\u00f6videbb \u00e9szlel\u00e9si id\u0151vel, ami re\u00e1lisabb a val\u00f3s web sz\u00e1m\u00e1ra.<\/p>\n\n\n\n<p>\u2022 Az \u00faj Antiphishing modellek azon alapulnak, hogy olyan adatcsomagokat \u00e9p\u00edtenek, amelyek a lehet\u0151 legk\u00f6zelebb \u00e1llnak a val\u00f3s webk\u00f6rnyezethez, k\u00fcl\u00f6nb\u00f6z\u0151 nyelvekkel, tartalmi min\u0151s\u00e9gekkel \u00e9s m\u00e1rk\u00e1kkal. Emellett, mivel a phishing \u00e9szlel\u00e9s egy oszt\u00e1lyegyens\u00faly-probl\u00e9ma, most sok pozit\u00edv \u00e9s negat\u00edv mint\u00e1t \u00f6sszekevernek, ami nagyon neh\u00e9zz\u00e9 teszi a felismer\u00e9s\u00fcket. Mindezek a dolgok megnehez\u00edtik az Antiphishing \u00e9szlel\u00e9si modellek kidolgoz\u00e1s\u00e1t, amelyek j\u00f3l m\u0171k\u00f6dnek \u00e9s haszn\u00e1lhat\u00f3k a val\u00f3s webk\u00f6rnyezetben.<\/p>\n\n\n\n<p>M\u00e9g sok Antiphishing modell is \u00fagy m\u0171k\u00f6dik, hogy \u00f6sszehasonl\u00edtja az URL-eket, c\u00edmeket, linkeket, bejelentkez\u00e9si mez\u0151ket, szerz\u0151i jogi inform\u00e1ci\u00f3kat, bizalmas kifejez\u00e9seket, keres\u0151motor-inform\u00e1ci\u00f3kat, s\u0151t a weboldalak m\u00e1rk\u00e1inak log\u00f3it is, \u00e9s kimutatt\u00e1k, hogy felhaszn\u00e1lhat\u00f3k a phishing weboldalak felismer\u00e9s\u00e9re. Az elm\u00falt \u00e9vekben nagyobb figyelmet ford\u00edtottak a vizu\u00e1lis megt\u00e9veszt\u00e9si jellemz\u0151kre \u00e9s az \u00e9rt\u00e9kel\u00e9si jellemz\u0151kre. De nem voltak el\u00e9g er\u0151sek ahhoz, hogy meg\u00e1llap\u00edts\u00e1k, egy oldal phishing oldal-e.<\/p>\n\n\n\n<p>\u201c<em><a href=\"https:\/\/docs.apwg.org\/reports\/APWG_Global_Phishing_Report_2015-2016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">A phishing weboldalak t\u00f6bb mint 98%-a hamis domainneveket haszn\u00e1l<\/a>,\u201d <\/em>mondja az APWG. Az antiphishing modellek eset\u00e9ben a kutat\u00f3k az URL-karakterl\u00e1nc inform\u00e1ci\u00f3it haszn\u00e1lj\u00e1k. Azonban a domainn\u00e9v m\u00f6g\u00f6tti inform\u00e1ci\u00f3k megszerz\u00e9se, mint p\u00e9ld\u00e1ul a domain regisztr\u00e1ci\u00f3 \u00e9s felold\u00e1s, szint\u00e9n nagyon fontos a phishing \u00e9szlel\u00e9shez. Ez az inform\u00e1ci\u00f3 gyakran megmutathatja, hogy egy domainn\u00e9v jogosult-e m\u00e1rk\u00e1val kapcsolatos szolg\u00e1ltat\u00e1sok ny\u00fajt\u00e1s\u00e1ra. Teh\u00e1t az antiphishing kutat\u00f3k f\u0151 feladata hat\u00e9kony jellemz\u0151k megtal\u00e1l\u00e1sa. Ezt \u00fagy teszik, hogy megvizsg\u00e1lj\u00e1k a szoci\u00e1lis m\u00e9rn\u00f6ki t\u00e1mad\u00e1sokat, \u00e9s javasolnak egy teljes \u00e9s k\u00f6nnyen \u00e9rthet\u0151 jellemz\u0151keretet, amely nemcsak a phishing t\u00e1mad\u00e1sok minden aspektus\u00e1t, hanem a webes tartalom min\u0151s\u00e9g\u00e9t \u00e9s relevanci\u00e1j\u00e1t is lefedi.<\/p>\n\n\n\n<p><strong>T\u00f6bbl\u00e9pcs\u0151s phishing \u00e9szlel\u00e9s<\/strong><\/p>\n\n\n\n<p><strong>1. szakasz<\/strong>: Feh\u00e9rlista sz\u0171r\u00e9s Ebben a szakaszban a val\u00f3s weboldalakat elv\u00e1lasztj\u00e1k a gyan\u00fasakt\u00f3l a c\u00e9lm\u00e1rka weboldal\u00e1nak phishing domainneve alapj\u00e1n.<\/p>\n\n\n\n<p><strong>2. szakasz<\/strong>: Ez a hamis sz\u00e1ml\u00e1k gyors elt\u00e1vol\u00edt\u00e1s\u00e1nak szakasza. Ez mag\u00e1ban foglalja a hamis c\u00edmfunkci\u00f3, a hamis sz\u00f6vegfunkci\u00f3 \u00e9s a hamis vizu\u00e1lis funkci\u00f3 elt\u00e1vol\u00edt\u00e1s\u00e1t egy \u00e9szlel\u00e9si modell seg\u00edts\u00e9g\u00e9vel. Az utols\u00f3 l\u00e9p\u00e9s a hamis\u00edt\u00e1s, lop\u00e1s, kapcsol\u00f3d\u00e1s, \u00e9rt\u00e9kel\u00e9s, k\u00e9pz\u00e9s \u00e9s modellek \u00e9szlel\u00e9s\u00e9nek pontos felismer\u00e9si funkci\u00f3inak kinyer\u00e9se \u00e9s kombin\u00e1l\u00e1sa a CASE funkci\u00f3 haszn\u00e1lat\u00e1val, amely egy m\u00f3dos\u00edtott modelleken alapul\u00f3 k\u00e9pz\u00e9salap\u00fa phishing \u00e9szlel\u00e9s.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">K\u00f6vetkeztet\u00e9s<\/h2>\n\n\n<p>Ezzel a t\u00f6bbl\u00e9pcs\u0151s \u00e9szlel\u00e9sen alapul\u00f3 phishing meg\u00e1ll\u00edt\u00e1si megk\u00f6zel\u00edt\u00e9ssel 2022-ben 883 phishing t\u00e1mad\u00e1s lesz a China Mobile ellen, 86 a Bank of China ellen, 19 a Facebook ellen \u00e9s 13 az Apple ellen. Ez azt mutatja, hogy a CASE modell lefedi a jellemz\u0151teret, amely t\u00fckr\u00f6zi a phishing megt\u00e9veszt\u0151 term\u00e9szet\u00e9t, biztos\u00edtva, hogy a jellemz\u0151k megk\u00fcl\u00f6nb\u00f6ztethet\u0151k \u00e9s \u00e1ltal\u00e1nos\u00edthat\u00f3k legyenek, \u00e9s hat\u00e9kony phishing \u00e9szlel\u00e9si t\u00e1mogat\u00e1st ny\u00fajt a jellemz\u0151k szintj\u00e9n.<\/p>","protected":false},"excerpt":{"rendered":"<p>Az adathal\u00e1szat a leggyakoribb m\u00f3dszer, amellyel a kiberb\u0171n\u00f6z\u0151k ma inform\u00e1ci\u00f3kat lopnak, \u00e9s ez a kiberfenyeget\u00e9s egyre s\u00falyosbodik, ahogy egyre t\u00f6bb jelent\u00e9s \u00e9rkezik az adatv\u00e9delmi sziv\u00e1rg\u00e1sokr\u00f3l \u00e9s p\u00e9nz\u00fcgyi\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Hat\u00e9kony t\u00f6bbf\u00e1zis\u00fa adathal\u00e1sz weboldal-\u00e9szlel\u00e9si modell<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Data with an Efficient Phishing Detection Model<\/title>\n<meta name=\"description\" content=\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Data with an Efficient Phishing Detection Model\" \/>\n<meta property=\"og:description\" content=\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T00:18:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Efficient Multistage Phishing Website Detection Model\",\"datePublished\":\"2023-03-02T00:18:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"articleSection\":[\"Phishing\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\",\"url\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\",\"name\":\"Protect Your Data with an Efficient Phishing Detection Model\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"datePublished\":\"2023-03-02T00:18:09+00:00\",\"description\":\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Efficient Multistage Phishing Website Detection Model\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Efficient Multistage Phishing Website Detection Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00e9dje adatait egy hat\u00e9kony adathal\u00e1szat-\u00e9szlel\u0151 modellel","description":"Tanulja meg, hogyan seg\u00edthet egy adathal\u00e1szat-felismer\u0151 modell megel\u0151zni az adathal\u00e1sz t\u00e1mad\u00e1sokat. Tartsa biztons\u00e1gban \u00e9rz\u00e9keny adatait a kiberb\u0171n\u00f6z\u0151kt\u0151l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/","og_locale":"hu_HU","og_type":"article","og_title":"Protect Your Data with an Efficient Phishing Detection Model","og_description":"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.","og_url":"https:\/\/securitybriefing.net\/hu\/adathalaszat\/hatekony-tobblepcsos-adathalasz-weboldal-eszlelesi-modell\/","og_site_name":"Security Briefing","article_published_time":"2023-03-02T00:18:09+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Efficient Multistage Phishing Website Detection Model","datePublished":"2023-03-02T00:18:09+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","articleSection":["Phishing"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/","url":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/","name":"V\u00e9dje adatait egy hat\u00e9kony adathal\u00e1szat-\u00e9szlel\u0151 modellel","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","datePublished":"2023-03-02T00:18:09+00:00","description":"Tanulja meg, hogyan seg\u00edthet egy adathal\u00e1szat-felismer\u0151 modell megel\u0151zni az adathal\u00e1sz t\u00e1mad\u00e1sokat. Tartsa biztons\u00e1gban \u00e9rz\u00e9keny adatait a kiberb\u0171n\u00f6z\u0151kt\u0151l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","width":760,"height":388,"caption":"Efficient Multistage Phishing Website Detection Model"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Efficient Multistage Phishing Website Detection Model"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1837"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1837\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1527"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}