6 Conclusion
Attacks using phishing are still one of the biggest risks to people and
businesses today. This is mostly driven by human engagement in the
phishing cycle, as was mentioned in the article. Phishers often prey on
human weaknesses in addition to promoting favorable technology settings
(i.e., technical vulnerabilities). Age, gender, internet addiction, user
stress, and many other characteristics have been found to affect a
person’s vulnerability to phishing. Along with more established phishing
channels (like email and the web), newer phishing mediums like phone and
SMS phishing are becoming more popular. Along with the expansion of
social media, phishing on social media has also become increasingly
prevalent. Concurrently, phishing has evolved beyond financial crimes
and collecting sensitive information to include cyberterrorism,
hacktivism,
REFERENCES
- Steinhoff, U., A. Wiesmaier, and R. Araújo. ”The state of the art in
DNS spoofing.” Proc. 4th Intl. Conf. Applied Cryptography and Network
Security (ACNS). 2006.
- Ramzan, Zulfikar, and Candid Wüest. ”Phishing Attacks: Analyzing
Trends in 2006.” CEAS. 2007.
- Felten, Edward W., et al. ”Web spoofing: An internet con game.”
Software World 28.2 (1997): 6-8
- Choi, Kwan, Ju-lak Lee, and Yong-tae Chun. ”Voice phishing fraud and
its modus operandi.” Security Journal 30.2 (2017): 454-466.
- Bhavsar, Vaishnavi, Aditya Kadlak, and Shabnam Sharma. ”Study on
phishing attacks.” Int. J. Comput. Appl 182 (2018): 27-29
- Banu, M. Nazreen, and S. Munawara Banu. ”A comprehensive study of
phishing attacks.” International Journal of Computer Science and
Information Technologies 4.6 (2013): 783-786
- Yadav, Surendra, and Brahmdutt Bohra. ”A review on recent phishing
attacks on the Internet.” 2015 International Conference on Green
Computing and Internet of Things (ICGCIoT). IEEE, 201
- Peltier, Thomas R. ”Social engineering: Concepts and solutions.
“Information Security Journal 15.5 (2006):
- Chiang Yung-chen. Social engineering and the social sciences in China,
1919-1949. Cambridge University Press, 2001
- Krombholz, Katharina, et al. ”Advanced social engineering attacks.”
Journal of Information Security and applications 22 (2015): 113-122
- Vijayalakshmi, M., et al. ”Web phishing detection techniques: a survey
on the state‐of‐the‐art, taxonomy and future directions.” Iet Networks
9.5 (2020): 235-246.
- Ankit Kumar, and Brij B. Gupta. ”Phishing detection: analysis of
visual similarity-based approaches.” Security and Communication
Networks 2017 (2017)
- Chiew, Kang Leng, et al. ”A new hybrid ensemble feature selection
framework for machine learning-based phishing detection system.”
Information Sciences 484 (2019): 153-16
- Moghimi, Mahmood, and Ali Yazdani Varjani. ”New rule-based phishing
detection method.” Expert systems with applications 53 (2016): 231
-242.
- Qabajeh, Issa, Fadi Thabtah, and Francisco Chiclana. ”A recent review
of conventional vs. automated cybersecurity anti-phishing techniques.”
Computer Science Review 29 (2018): 44-55.
- A. Desai, J. Jatakia, R. Naik, and N. Raul, “Malicious web content
detection using machine leaning,” RTEICT 2017 - 2nd IEEE Int. Conf.
Recent Trends Electron. Inf. Commun. Technol. Proc., vol. 2018–Janua,
pp. 1432–1436, 2018.
- S. Parekh, D. Parikh, S. Kotak, and P. S. Sankhe, “A New Method for
Detection of Phishing Websites: URL Detection,” in 2018 Second
International Conference on Inventive Communication and Computational
Technologies (ICICCT), 2018, vol. 0, no. Icicct, pp. 949–952
- X. Zhang, Y. Zeng, X. Jin, Z. Yan, and G. Geng, “Boosting the
Phishing Detection Performance by Semantic Analysis,” 2017.
- J. Ma, L.K. Saul, S. Savage, G.M. Voelker, beyond block lists:
Learning to detect malicious web sites from suspicious URLs, In:
Proc.15th ACM SIGKDD Int.Conf. Knowledge Discovery and Data Mining,
Paris, France, 2009, pp. 1245-1254.
- S.C. Jeeva, E.B. Raj Singh Intelligent phishing URL detection using
association rule mining Humancentric Computing and Information
Sciences, 6 (1) (2016)
- A.K. Jain, B.B. Gupta towards detection of phishing websites on
client-side using machine learning based approach telecommunication
Systems, 68 (4) (2018), p. 687
- T. Peng, I. Harris, Y. Sawa detecting phishing attacks using natural
language processing and machine learning IEEE 12th international
conference on semantic computing (ICSC), Laguna Hills, CA (2018),
pp. 300-301
- P. Prakash, M. Kumar, R.R. Kompella, M. Gupta Phish net: Predictive
block-listing to detect phishing attacks 2010 Proceedings IEEE INFOCOM
(2010), pp. 1-5
- S. Aonzo, A. Merlo, G. Tavella, and Y. Fratantonio, “Phishing attacks
on modern android,” Proc. ACM Conf. Comput. Commun. Secur., pp.
1788–1801, 2018, Doi: 10.1145/3243734.3243778.
- Chen J., Guo C. Online detection, and prevention of phishing attacks
(Invited Paper) First International Conference on Communications and
Networking in China, ChinaCom ’06, IEEE, Beijing (2006)
- Zhang H, Liu G, Chow TWS, Liu W (2011) Textual and visual
content-based anti-phishing: an approach. IEEE Trans Neural Newt
22(10):1532–1546
- Lee S, Kim J (2013) Warningbird: a near real-time detection
- system for suspicious URLs in twitter stream. IEEE Trans Depend Secure
Comput 10(3):183–195
- Li T, Kou G, Peng Y (2020b) Improving malicious URLs detection via
feature engineering: Linear and nonlinear space transformation
methods. Inf Syst 91:101494
- Yang L, Zhang J, Wang X, Li Z, Li Z, He Y (2021) An improved elmbased
and data preprocessing integrated approach for phishing detection
- De La Torre Parra G, Rad P, Choo KKR, Beebe N (2020) Detecting
internet of things attacks using distributed deep learning. J Netw
Comput Appl 163:102662
- Kirda, Engin, and Christopher Kruegel. ”Protecting users against
phishing attacks with antiphish.” 29th Annual International
Computer Software and Applications Conference (COMPSAC’05) . Vol. 1.
IEEE, 2005.
- Kumar, Gaurav. ”Best plan to protect against phone phishing attack.”American Journal of Computer Science and Information Technology3.5 (2015): 167-172.
- Chuenchujit, T. 2016. A taxonomy of phishing research, University of
Illinoi
- J. Hong, “The State of Phishing Attacks
- Krieg, G. And Kopan, T. 2016. CNN News, is this the email that
- Herzberg, Amir, and Ahmad Garba, “Trust bar: Protecting (Even naive)
web users from spoofing and phishing attacks.” Computer Science
Department Bar Ilan University, PP 1-28, Jul 2004.
- Jian Mao, Pei Li, Kun Li, Tao Wei, and Zhenkai Liang, “Bait
AlarmDetecting Phishing Sites Using Similarity in Fundamental Visual
Features,” Intelligent Networking and Collaborative Systems (IN-CoS),
2013 5th International Conference on Intelligent Networking and
Collaborative System, PP. 790-795, 2013, Xi’an.
- Eric Medvet, Engin Kirda, and Christopher Kruegel, “Visual-
Similarity-Based Phishing Detection,” SecureComm ’08 Proceedings of
the fourth international conference on Security and privacy in
communication networks, Article no 2, PP. 1-11, 2008.
- Safe Browsing API – Google Developer, available at:
https://developers.google.com/safe–browsing/
- Juan Chen, and Chuanxiong Guo, “Online Detection and Prevention of
Phishing Attacks,” Communications a