A Comparative Analysis of Phishing Detection and Prevention Techniques (original) (raw)

Phishing Detection: A Literature Survey

IEEE Communications Surveys & Tutorials, 2000

This article surveys the literature on the detection of phishing attacks. Phishing attacks target vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread via mechanisms that exploit weaknesses found in endusers, which makes users the weakest element in the security chain. The phishing problem is broad and no single silver-bullet solution exists to mitigate all the vulnerabilities effectively, thus multiple techniques are often implemented to mitigate specific attacks. This paper aims at surveying many of the recently proposed phishing mitigation techniques. A high-level overview of various categories of phishing mitigation techniques is also presented, such as: detection, offensive defense, correction, and prevention, which we belief is critical to present where the phishing detection techniques fit in the overall mitigation process.

IJERT-A Survey on various Phishing and Anti-Phishing Measures

International Journal of Engineering Research and Technology (IJERT), 2015

https://www.ijert.org/a-survey-on-various-phishing-and-anti-phishing-measures https://www.ijert.org/research/a-survey-on-various-phishing-and-anti-phishing-measures-IJERTV4IS010143.pdf Phishing, a semantic attack which targets the user rather than the computer is turning into a breeding ground for vast fraudulency over the internet; and therefore is one of the most challenges toward internet security. Phishing is a way in which perpetrators adopt social engineering schemes by sending e-mails, instant messages or online advertising to allure users to phishing websites that mimic trustworthy websites in order to trick individuals into revealing their sensitive information like, financial account details or passwords which can then be exploited for a specific reason. To protect users against phishing attacks various anti-phishing strategies have been implemented having different strategies. This paper presents the various phishing attacks followed by a review of various anti-phishing techniques.

Anti-Phishing Techniques – A Review of Cyber Defense Mechanisms

IJARCCE

Phishing has been a constant issue across the global community. The approach has primarily been related to most attackers gaining access to sensitive information about users. Lack of awareness is among the main factors that result in successful phishing attacks. There are different types of phishing attacks available. However, cybersecurity specialists have developed algorithms that have effectively prevented phishing attacks. The report below includes information on anti-phishing algorithms that can detect phishing attacks. The algorithms include different technologies and capabilities that promote safety for most individuals. The paper focuses on describing each of these concepts and how they promote cybersecurity across the globe.

Detection of phishing attacks using the anti-phishing framework

Scientific Bulletin of Naval Academy, 2020

In the area of computer security, phishing is a form of criminal activity that involves obtaining sensitive data, such as access data for banking applications, e-commerce applications (such as eBay or PayPal) or credit card information, using techniques to manipulate the identity data of a person or institution. A phishing attack consists of sending the attacker an electronic message, using instant messaging software or telephone, in which the user is advised to give his confidential data to win certain prizes, or is informed that they are prizes. necessary due to technical errors that led to the loss of the original data. According to the reports of the Anti-Phishing Working Group (APWG) published in December 2018, phishing against banking and the payment processor was high. Almost all phishy URLs use HTTPS and use redirects to avoid detection. This paper is a comparative survey of the available methods for detecting phishing sites. There has been a comparative study of anti-phishing tools and their limitations have been found. An anti-phishing model, a framework to help detect these attacks, is discussed. The identification of this type of attack is a very important problem considering that, at present, people carry out many online transactions regarding money transfer, payment of bills or purchases.

Types of anti-phishing solutions for phishing attack

IOP Conference Series: Materials Science and Engineering, 2020

Nowadays, many people use Internet to do online activity. This scenario exposed them to danger in Internet which is phishing attack. In order to solve phishing attack, the anti-phishing solutions are needed. Based on our review, there are still lacks of articles that review on the types of anti-phishing solutions in detail. In this paper, a general idea of phishing attack and anti-phishing solutions is presented. The phishing attack can be classified into two categories which are social engineering and malware-based phishing attack. The anti-phishing solutions can be differentiating into two types which are phishing prevention and phishing detection. Compared to phishing prevention, the phishing detection is more important to solve the phishing attack. In phishing detection, there are two categories which are user awareness and software detection. The software detection has two methods which are traditional and automatic. There are two types for automatic method of software detectio...

A Survey of Phishing Website Detection and Prevention Techniques

2017

Phishing attack has become one of the most serious issues in today's world. Many people have lost huge sums of money by becoming victim to these attacks. Phishing websites trick internet users into divulging their personal or financial information such as username, password, credit card details, bank details etc. These websites look exactly like the original website. Various anti-phishing techniques make use of different features of the webpage in order to identify the fraud website. In this paper, we discuss different phishing detection techniques and present the survey of various phishing website detection approaches.

Detection and Prevention of Phishing Attack: An Approach for Eradication of Phishing

Phishing is like masquerading the trusted party to acquire the sensitive information from users. Phishing attacks are usually carried out through fake websites, fake URLs, fake attachments in emails, fake messages. The main aim of phishing attack is to fool the users by finding the weakness of the user. One of the best step to be taken to avoid this attack is that to educate the users about the fake links given in the website, where they should not visit such links and give the required credentials. Anyhow to make understand the user about the phishing attack becomes unrealistic, attackers find many ways to fool the users for browsing the fake website where they are given their personal credentials. Here in the proposed system there are two methods one is, the urls are considered from email, keyword search, website and compared with the database and the second method is to detect Phishing through image.

A Comprehensive Study of Phishing Attacks

2013

Now a days one of the highly used techniques to pursue online stealing of data and to do fraudulent transactions is phishing. Phishing is a form of online identity theft that aims to steal sensitive information such as online passwords and credit card information. It is affecting all the major sectors of industry day by day with a lot of misuse of user credentials. To stop phishing many detection and prevention techniques has been made with their own advantages and disadvantages respectively, but phishing has not been eradicated completely yet. In this paper , we have studied phishing and its types in detail and reviewed some of the phishing and anti phishing techniques. KeywordsPhishing, Anti-phishing, Malware, Web spoofing.

A Survey of Online Detection and Prevention of Phishing Attacks

2013

Phishing is a kind of network attack which impacts financial loss and makes user a fool. Phishing attackers attract innocent website users by providing fake websites .In recent years phishing is a technique used for cyber crimes. In this paper we present an overview of different techniques used by the attackers and its prevention approaches.