ABSTRACT
Phishing is form of identity theft that uses the social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. It is a kind of attack in which phishers use spoofed emails and fraudulent web sites to trick people into giving up personal information. Victims perceive these emails as trusted, while in reality they are the work of phishers interested in identity theft. Web site phishing attacks usually start with an e-mail that arrives in the victim's mailbox pretending to be a legitimate and known entity. Usually, the mail claims some urgent steps to be taken by the user to avoid blocking of user account and direct him to a web page asking him to enter private information. But the web page is not legitimate and has no association with the organization it claims to be. Hence, the number of phishing fraud is continuing to grow, and the costs of the damages caused are increasing day by day. Therefore, there is the urgent need for anti-phishing solutions and recently have been identified, a number of solutions to mitigate phishing attacks have been proposed.
- Maher Aburrous, M. A. Hossain, FadiThabatah, KeshavDahal "Intelligent Phishing Website Detection System using Fuzzy Techniques".Google Scholar
- Sujata Garera, Niels Provos & Monica Chew "A Framework for Detection and Measurement of Phishing Attacks" WORM'07, November 2, 2007, Alexandria, Virginia, USA. Google ScholarDigital Library
- White paper by Tod Beardsley "Phishing Detection and Prevention" Practical Counter-Fraud Solutions.Google Scholar
- Thomas Raffetseder, Engin Kirda, and Christopher Kruegel "Building Anti-Phishing Browser Plug-Ins: An Experience Report" Third International Workshop on Software Engineering for Secure Systems (SESS'07) Google ScholarDigital Library
- Maher Aburrous, M. A. Hossain, Keshav Dahal, FadiThabtah "Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies" 2010 Seventh International Conference on Information Technology. Google ScholarDigital Library
- Huajun Huang, Junshan Tan, Lingxi Liu "Countermeasure Techniques for Deceptive Phishing Attack" 2009 International Conference on New Trends in Information and Service Science. Google ScholarDigital Library
- Huajun Huang, ShaohongZhong, Junshan Tan "Browserside Countermeasures for Deceptive Phishing Attack" 2009 Fifth International Conference on Information Assurance and Security. Google ScholarDigital Library
- Maher Aburrous, M. A. Hossain, Keshav Dahal, Fadi Thabtah "Associative Classification Techniques for predicting e-Banking Phishing Websites" MCIT2010.Google Scholar
- Yogesh Joshi, Samir Saklikar, Debabrata Das, and Subir Saha "Phish Guard: A Browser Plug-in for Protection from Phishing".\Google Scholar
- Xun Dong, John A. Clark and Jeremy L. Jacob "User Behaviour Based Phishing Websites Detection" Proceedings of the International Multiconference on Computer Science and Information Technology 783--790, 2008.Google Scholar
- Online http://www.hackingaday.com/2009/11/fake-login-page.html dated 17-sept-2010.Google Scholar
- Abdullah Alnajim and Malcolm Munro "An Evaluation of Users' Tips Effectiveness for Phishing Websites Detection".Google Scholar
Index Terms
- A phishing analysis of web based systems
Recommendations
Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand Websites
WWW '24: Proceedings of the ACM on Web Conference 2024Phishing attacks have persistently remained a prevalent and widespread cybersecurity threat for several years. This leads to numerous endeavors aimed at comprehensively understanding the phishing attack ecosystem, with a specific focus on presenting new ...
Phish-IDetector: Message-Id Based Automatic Phishing Detection
ICETE 2015: Proceedings of the 12th International Joint Conference on e-Business and Telecommunications - Volume 4Phishing attacks are a well known problem in our age of electronic communication. Sensitive information
like credit card details, login credentials for account, etc. are targeted by phishers. Emails are the most
common channel for launching phishing ...
A Sender-Centric Approach to Detecting Phishing Emails
CYBERSECURITY '12: Proceedings of the 2012 International Conference on Cyber SecurityEmail-based online phishing is a critical security threat on the Internet. Although phishers have great flexibility in manipulating both the content and structure of phishing emails, phishers have much less flexibility in completely concealing the ...
Comments