Impersonation attacks are the form of cyber attack that has evolved the most in recent years. Impersonation in its most basic form is the act of pretexting as another person. Pretexting is the basic form of social engineering, where a person mimics another person to obtain data or resources that have been assigned to the privileged person only.
To understand impersonation attacks better, and to detect the different attacks and see how machine learning can solve them, we will go through the following topics:
- Understanding impersonation
- Different types of impersonation fraud
- Understanding Levenshtein distance
- Use case on finding malicious domain similarity
- Use case to detect authorship attribution