skip to main content
10.1145/1947940.1948049acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccsConference Proceedingsconference-collections
research-article

A phishing analysis of web based systems

Authors Info & Claims
Published:12 February 2011Publication History

ABSTRACT

Phishing is form of identity theft that uses the social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. It is a kind of attack in which phishers use spoofed emails and fraudulent web sites to trick people into giving up personal information. Victims perceive these emails as trusted, while in reality they are the work of phishers interested in identity theft. Web site phishing attacks usually start with an e-mail that arrives in the victim's mailbox pretending to be a legitimate and known entity. Usually, the mail claims some urgent steps to be taken by the user to avoid blocking of user account and direct him to a web page asking him to enter private information. But the web page is not legitimate and has no association with the organization it claims to be. Hence, the number of phishing fraud is continuing to grow, and the costs of the damages caused are increasing day by day. Therefore, there is the urgent need for anti-phishing solutions and recently have been identified, a number of solutions to mitigate phishing attacks have been proposed.

References

  1. Maher Aburrous, M. A. Hossain, FadiThabatah, KeshavDahal "Intelligent Phishing Website Detection System using Fuzzy Techniques".Google ScholarGoogle Scholar
  2. Sujata Garera, Niels Provos & Monica Chew "A Framework for Detection and Measurement of Phishing Attacks" WORM'07, November 2, 2007, Alexandria, Virginia, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. White paper by Tod Beardsley "Phishing Detection and Prevention" Practical Counter-Fraud Solutions.Google ScholarGoogle Scholar
  4. Thomas Raffetseder, Engin Kirda, and Christopher Kruegel "Building Anti-Phishing Browser Plug-Ins: An Experience Report" Third International Workshop on Software Engineering for Secure Systems (SESS'07) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Maher Aburrous, M. A. Hossain, Keshav Dahal, FadiThabtah "Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies" 2010 Seventh International Conference on Information Technology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Huajun Huang, Junshan Tan, Lingxi Liu "Countermeasure Techniques for Deceptive Phishing Attack" 2009 International Conference on New Trends in Information and Service Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Huajun Huang, ShaohongZhong, Junshan Tan "Browserside Countermeasures for Deceptive Phishing Attack" 2009 Fifth International Conference on Information Assurance and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Maher Aburrous, M. A. Hossain, Keshav Dahal, Fadi Thabtah "Associative Classification Techniques for predicting e-Banking Phishing Websites" MCIT2010.Google ScholarGoogle Scholar
  9. Yogesh Joshi, Samir Saklikar, Debabrata Das, and Subir Saha "Phish Guard: A Browser Plug-in for Protection from Phishing".\Google ScholarGoogle Scholar
  10. Xun Dong, John A. Clark and Jeremy L. Jacob "User Behaviour Based Phishing Websites Detection" Proceedings of the International Multiconference on Computer Science and Information Technology 783--790, 2008.Google ScholarGoogle Scholar
  11. Online http://www.hackingaday.com/2009/11/fake-login-page.html dated 17-sept-2010.Google ScholarGoogle Scholar
  12. Abdullah Alnajim and Malcolm Munro "An Evaluation of Users' Tips Effectiveness for Phishing Websites Detection".Google ScholarGoogle Scholar

Index Terms

  1. A phishing analysis of web based systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & Security
            February 2011
            656 pages
            ISBN:9781450304641
            DOI:10.1145/1947940

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 February 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader