A Comprehensive Survey of Recent Phishing Attacks Detection Techniques

被引:0
|
作者
Priya, S. [1 ,2 ]
Gutema, Danat [3 ]
Singh, Shweta [2 ,4 ]
机构
[1] Manipal Inst Technol Bengaluru, Dept Informat Technol, Bengaluru, India
[2] Manipal Acad Higher Educ, Manipal, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Techno, Dept CSE, Morai, India
[4] Manipal Inst Technol Bengaluru, Dept ECE, Bengaluru, India
关键词
Website Phishing; Feature Selection; Identity Theft; Online Security; and Neural Network;
D O I
10.1109/CITIIT61487.2024.10580446
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks lead to fraudulent acquisition of user credentials, which is turn result in potential harm to reputation and financial security of individuals and organization. The initial instances of phishing attacks emerged in mid of 1990, when a group of hackers impersonated AOL employees through instant messages and emails, aiming to steal passwords and hijack accounts. Over the past two decades, the number of internet users has consistently grown, which has consequently led to an increase in attackers employing various technologies, software, and malicious tools. The proliferation of devices such as computers and smartphones has further contributed to the rapid rise of phishing attacks. These attacks can lead to severe financial theft and pose a significant risk to the reputation of organizations. To counter this threat, numerous techniques and algorithms have been developed and implemented. This paper explores the different detection methods, providing an analysis of their strengths and limitations.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
    Richa Goenka
    Meenu Chawla
    Namita Tiwari
    International Journal of Information Security, 2024, 23 : 819 - 848
  • [32] Training to Mitigate Phishing Attacks Using Mindfulness Techniques
    Jensen, Matthew L.
    Dinger, Michael
    Wright, Ryan T.
    Thatcher, Jason Bennett
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (02) : 597 - 626
  • [33] Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
    Wright, Ryan T.
    Jensen, Matthew L.
    Thatcher, Jason Bennett
    Dinger, Michael
    Marett, Kent
    INFORMATION SYSTEMS RESEARCH, 2014, 25 (02) : 385 - 400
  • [34] A Survey on Various Detection Techniques of Sinkhole Attacks in WSN
    Mathew, Annie
    Terence, J. Sebastian
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 1115 - 1119
  • [35] A Survey on SQL Injection Attacks, Detection and Prevention Techniques
    Kumar, Puspendra
    Pateriya, R. K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [36] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [37] A survey of the QR code phishing: the current attacks and countermeasures
    Yong, Kelvin S. C.
    Chiew, Kang Leng
    Tan, Choon Lin
    2019 7TH INTERNATIONAL CONFERENCE ON SMART COMPUTING & COMMUNICATIONS (ICSCC), 2019, : 255 - 259
  • [38] AN IDEAL APPROACH FOR DETECTION AND PREVENTION OF PHISHING ATTACKS
    Shekokar, Narendra M.
    Shah, Chaitali
    Mahajan, Mrunal
    Rachh, Shruti
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 : 82 - 91
  • [39] Phishing Attacks Detection Using Genetic Programming
    Tuan Anh Pham
    Quang Uy Nguyen
    Xuan Hoai Nguyen
    KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2013), VOL 2, 2014, 245 : 185 - 195
  • [40] Machine Learning Techniques for Detecting Phishing URL Attacks
    Mosa, Diana T.
    Shams, Mahmoud Y.
    Abohany, Amr A.
    El-kenawy, El-Sayed M.
    Thabet, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1271 - 1290