A Comprehensive Survey of Recent Phishing Attacks Detection Techniques

被引:0
|
作者
Priya, S. [1 ,2 ]
Gutema, Danat [3 ]
Singh, Shweta [2 ,4 ]
机构
[1] Manipal Inst Technol Bengaluru, Dept Informat Technol, Bengaluru, India
[2] Manipal Acad Higher Educ, Manipal, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Techno, Dept CSE, Morai, India
[4] Manipal Inst Technol Bengaluru, Dept ECE, Bengaluru, India
关键词
Website Phishing; Feature Selection; Identity Theft; Online Security; and Neural Network;
D O I
10.1109/CITIIT61487.2024.10580446
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks lead to fraudulent acquisition of user credentials, which is turn result in potential harm to reputation and financial security of individuals and organization. The initial instances of phishing attacks emerged in mid of 1990, when a group of hackers impersonated AOL employees through instant messages and emails, aiming to steal passwords and hijack accounts. Over the past two decades, the number of internet users has consistently grown, which has consequently led to an increase in attackers employing various technologies, software, and malicious tools. The proliferation of devices such as computers and smartphones has further contributed to the rapid rise of phishing attacks. These attacks can lead to severe financial theft and pose a significant risk to the reputation of organizations. To counter this threat, numerous techniques and algorithms have been developed and implemented. This paper explores the different detection methods, providing an analysis of their strengths and limitations.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Directed adversarial sampling attacks on phishing detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Chuck
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (01) : 1 - 23
  • [42] A Literature Survey on Social Engineering Attacks: Phishing Attack
    Gupta, Surbhi
    Singhal, Abhishek
    Kapoor, Akanksha
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 537 - 540
  • [43] An intrusion detection system for detecting phishing attacks
    Pamunuwa, Hasika
    Wijesekera, Duminda
    Farkas, Csilla
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 181 - +
  • [44] Phishing Attacks Survey: Types, Vectors, and Technical Approaches
    Alabdan, Rana
    FUTURE INTERNET, 2020, 12 (10): : 1 - 39
  • [45] A survey of phishing attacks: Their types, vectors and technical approaches
    Chiew, Kang Leng
    Yong, Kelvin Sheng Chek
    Tan, Choon Lin
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 106 : 1 - 20
  • [46] Phishing Email Detection Using Natural Language Processing Techniques: A Literature Survey
    Salloum, Said
    Gaber, Tarek
    Vadera, Sunil
    Shaalan, Khaled
    AI IN COMPUTATIONAL LINGUISTICS, 2021, 189 : 19 - 28
  • [47] A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
    Roseline, S. Abijah
    Geetha, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [48] A Recent Survey on Colon Cancer Detection Techniques
    Rathore, Saima
    Hussain, Mutawarra
    Ali, Ahmad
    Khan, Asifullah
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2013, 10 (03) : 545 - 563
  • [49] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
    Pour, Morteza Safaei
    Naderb, Christelle
    Friday, Kurt
    Bou-Harb, Elias
    COMPUTERS & SECURITY, 2023, 128
  • [50] An End-to-End Approach for the Detection of Phishing Attacks
    Hammi, Badis
    Bilot, Tristan
    Bazain, Danyil
    Binand, Nicolas
    Jaen, Maxime
    Mitta, Chems
    El Madhoun, Nour
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 314 - 325