Synonyms
Glossary
- Social Engineering Attacks:
-
Attacks that rely on the psychological manipulation of the chosen victim
- Spam:
-
Huge bulk of copied messages to an extremely large number of recipients
- DNS Hijacking/DNS Redirection:
-
The practice of redirecting the resolution of Domain Name Systems (DNS) names to other DNS servers
Definition
Phishing is a kind of attack whereby an attacker endeavors to steal sensitive information. The technique is to direct the victim to provide the information voluntarily under the pretence that this information is requested by a legitimate source. Phishing attacks are usually motivated by the intention of stealing personal credit card or personal bank account details via e-mails but are also used for many other purposes always depending on the situation and the needs of the phisher. Social network phishing is the technique of stealing users’ log-in and other sensitive personal information in online social network sites.
Introduction
Millions of...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anandpara V, Dingman A, Jakobsson M, Liu D, Roinestad H (2007) Phishing IQ tests measure fear, not ability. In: Proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Scarborough, pp 1–6
Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: 18th international conference on World Wide Web (WWW), Madrid, pp 551–560
Chhabra S, Aggarwal A, Benevenuto F, Kumaraguru P (2011) Phi.sh/$ocial: the phishing landscape through short urls. In: Annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Perth, pp 92–101
Cranor L, Egelman S, Hong J, Zhang Y (2006) Phinding phish: an evaluation of anti-phishing toolbars. Technical report, Carnegie Mellon University
CriminalDefenceLawyer.com. Phishing: sentencing and penalties. Address to download http://www.criminaldefenselawyer.com/crime-penalties/federal/phishing.htm. Retrieved on 1 Oct 2012
Dhamija R, Tygar JD, Hearst M (2006) Why phishing works. In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal, pp 581–550
Evans J (2013) Manage your Facebook privacy and reputation profile, 2011. Address to download http://www.julianevansblog.com/2011/04/manage-your-facebook-privacy-and-reputation-profile.html. Retrieved on 18 Apr 2013
Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2006) CSI/FBI computer crime and security survey. Technical report, Computer Security Institute
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the workshop on privacy in the electronic society, Alexandria, pp 71–80
Huber M, Kowalski S, Nohlberg M, Tjoa S (2009) Towards automating social engineering using social networking sites. In: IEEE international conference on computational science and engineering, vol 3, Vancouver, pp 117–124
Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee (SSAC) (2005) Domain name hijacking: incidents, threats, risks, and remedial action. Address to download http://archive.icann.org/en/announcements/hijacking-report-12jul05.pdf. Retrieved on 3 Nov 2013
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Jakobsson M, Myers S (eds) (2006) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley, Hoboken
Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J (2007) Teaching Johnny not to fall for phish technology. Cranegie Mellon University, Pittsburgh
Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J (2010) Teaching Johnny not to fall for phish. ACM Trans Internet Technol 10(2):31
Liberman M (2013) Phishing, in the language log, 2004. Address to download http://itre.cis.upenn.edu/~myl/languagelog/archives/001477.html. Retrieved on 18 Apr 2013
McGeehan R (2009) Protect yourself against phishing. Technical report, Facebook. Address to download https://www.facebook.com/blog.php?post=81474932130. Retrieved on 18 Apr 2013
Michelakis E, Androutsopoulos I, Paliouras G, Sakkis G, Stamatopoulos P (2004) Filtron: a learning-based antispam filter. In: Proceedings of the 1st conference on email and anti-spam, Mountain View
Nazir A, Raza S, Chuah C-N (2008) Unveiling facebook: a measurement study of social network based applications. In: Proceedings of the 8th ACM SIGCOMM conference on internet measurement. ACM, Vouliagmeni, pp 43–56
PhishMe Inc (2013) Phishme. Address to download http://www.phishme.com/. Retrieved on 18 Apr 2013
Phishtank. http://www.phishtank.com. Retrieved on 18 Apr 2013
Robila SA, Ragucci JW (2006) Don’t be a phish: steps in user education. In: Proceedings of the 11th annual SIGCSE conference on innovation and technology in computer science education, Bologna, Italy. ACM, New York, pp 237–241
SonicWALL, Inc (2013) SonicWALL phishing IQ test. Address to download http://www.sonicwall.com/furl/phishing. Retrieved on 18 Apr 2013
TechTarget. Hijacking – definition. Address to download http://searchsecurity.techtarget.com/definition/hijacking. Retrieved on 18 Apr 2013
Zhang Y, Egelman S, Cranor LF, Hong J (2007) Phinding phish: evaluating anti-phishing tools. In: Proceedings of the 14th annual network & distributed system security symposium (NDSS), San Diego
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Theodoros, T., Loukas, K. (2018). Online Social Network Phishing Attack. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_348
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_348
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering