International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | CyberSafe: A Social Engineering Attack Simulation System |
|---|---|
| ABSTRACT | This paper presents an Interactive Cybersecurity Awareness and Training Platform designed to simulate real-world social engineering attacks such as phishing, smishing, pretexting, and scareware. The system enables users to engage in decision-based learning by interacting with realistic scenarios and receiving immediate feedback, scoring, and prevention guidance. A full-stack architecture using React, Node.js, and MongoDB ensures efficient user interaction, backend processing, and persistent data storage. The platform incorporates adaptive learning by analyzing user performance and identifying weak areas, thereby improving cybersecurity awareness and response capability. Experimental results show enhanced user understanding and decision-making accuracy after repeated interactions. |
| AUTHOR | NETRA CHANDRAKANT NEMAN, DISHA GANESH GAWADE, SAMIKSHA RAKESH PATIL, PROF. MANSI TRIVEDI, PROF. JUNAID MANDVIWALA Department of Artificial Intelligence and Data Science, Rizvi College of Engineering, Bandra Mumbai, India |
| VOLUME | 183 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1404026 |
| pdf/26_CyberSafe A Social Engineering Attack Simulation System.pdf | |
| KEYWORDS | |
| References | 1. H. Gil, J. Yoo and J. Lee, “An On-demand Energy-efficient Routing Algorithm for Wireless Ad hoc Networks,” in Proc. 2nd Int. Conf. Human Society and Internet (HSI’03), pp. 302–311, 2003. 2. S. K. Dhurandher, S. Misra, M. S. Obaidat, V. Basal, P. Singh and V. Punia, “An Energy-Efficient On Demand Routing Algorithm for Mobile Ad-Hoc Networks,” in Proc. Int. Conf. Electronics, Circuits and Systems, pp. 958–961, 2008. 3. D. Kumar S. M. and B. P. Vijaya Kumar, “Energy-Aware Multicast Routing in MANETs: A Genetic Algorithm Approach,” Int. Journal of Computer Science and Information Security (IJCSIS), vol. 2, 2009. 4. M. AlGabri, C. Li, Z. Yang, N. Hasan and X. Zhang, “Improved the Energy of Ad hoc On-Demand Distance Vector Routing Protocol,” in Int. Conf. Future Computer Supported Education, Elsevier IERI, pp. 355–361, 2012. 5. D. Shama and A. Kush, “GPS Enabled Energy Efficient Routing for MANET,” International Journal of Computer Networks (IJCN), vol. 3, no. 3, pp. 159–166, 2011. 6. S. Jain and S. Jain, “Energy Efficient Maximum Lifetime Ad-Hoc Routing (EEMLAR),” International Journal of Computer Networks and Wireless Communications, vol. 2, no. 4, pp. 450–455, 2012. 7. R. Vadivel and V. Murali Bhaskaran, “Energy Efficient with Secured Reliable Routing Protocol (EESRRP) for Mobile Ad-Hoc Networks,” Procedia Technology, vol. 4, pp. 703–707, 2012. 8. N. Ezaki, M. Bulacu and L. Schomaker, “Text Detection from Natural Scene Images: Towards a System for Visually Impaired Persons,” in Proc. 17th Int. Conf. Pattern Recognition (ICPR), IEEE, pp. 683–686, 2004. 9. R. H. Davda and N. Mohammed, “Text Detection, Removal and Region Filling Using Image Inpainting,” International Journal of Futuristic Science Engineering and Technology, vol. 1, no. 2, ISSN 2320–4486, 2013. 10. U. Modha and P. Dave, “Image Inpainting: Automatic Detection and Removal of Text From Images,” International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 2, 2012. |