Detecting and Analyzing Social Network Based Phishing Activities over the Internet to Enhance Cyber Security
@inproceedings{Shaikh2019DetectingAA, title={Detecting and Analyzing Social Network Based Phishing Activities over the Internet to Enhance Cyber Security}, author={Farhana J. Shaikh and Harun Hawaldar and Ankita Jangade}, year={2019} }
Phishing is an expeditiously growing threat in web world, damaging internet user’s privacy and stealing billions of dollars every year. It is an illegitimate activity which uses a group of technical exploits and social engineering to collect an internet user’s personal information. Different phishing tools and techniques can be identified in various methods of communication like fake websites, emails, instant messages and pop-up messages. Over the time span, a number of research papers have…
No Paper Link Available
References
SHOWING 1-10 OF 32 REFERENCES
A layout-similarity-based approach for detecting phishing pages
- Computer Science2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007
- 2007
An extension of the AntiPhish system (called DOMAntiPhish) is presented, which leverages layout similarity information to distinguish between malicious and benign web pages and significantly reduces the false alarm rate.
Defending against phishing attacks: taxonomy of methods, current issues and future directions
- Computer ScienceTelecommun. Syst.
- 2018
The history of phishing attacks and the attackers’ motivation in details are discussed and a taxonomy of various types ofphishing attacks is provided to protect users from phishing based on the attacks identified in this taxonomy.
Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks
- Computer Science2010 10th IEEE International Conference on Computer and Information Technology
- 2010
A methodology to develop an intelligent tool and awareness security program to address the risk of phishing through email and the cost of these types of attacks exceeds millions of dollars annually.
“Phish mail guard: Phishing mail detection technique by using textual and URL analysis”
- Computer Science2012 World Congress on Information and Communication Technologies
- 2012
A technique where the advantages of blacklist, white list and heuristic technique are considered for increasing accuracy and reducing false positive rate is proposed, which will result in a highly accurate anti phishing email classifier.
Phishing counter measures and their effectiveness - literature review
- Business, Computer ScienceInf. Manag. Comput. Secur.
- 2012
The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories and the different approaches proposed so far are all preventive in nature.
Teaching Johnny not to fall for phish
- Computer ScienceTOIT
- 2010
The results suggest that, while automated detection systems should be used as the first line of defense against phishing attacks, user education offers a complementary approach to help people better recognize fraudulent emails and websites.
Protecting users against phishing attacks with AntiPhish
- Computer Science29th Annual International Computer Software and Applications Conference (COMPSAC'05)
- 2005
A novel browser extension, AntiPhish, is presented that aims to protect users against spoofed Web site-based phishing attacks and tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a Web site that is considered un-trusted.
Phishing - A Growing Threat to E-Commerce
- Computer ScienceArXiv
- 2011
Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed.
Decision strategies and susceptibility to phishing
- Computer ScienceSOUPS '06
- 2006
Preliminary analysis of interviews with 20 non-expert computer users to reveal their strategies and understand their decisions when encountering possibly suspicious emails suggests that people can manage the risks that they are most familiar with, but don't appear to extrapolate to be wary of unfamiliar risks.
Impact of anti-phishing tool performance on attack success rates
- Computer Science2012 IEEE International Conference on Intelligence and Security Informatics
- 2012
The results suggest that while the accuracy of anti-phishing tools is a critical factor, reducing the success rates of phish attacks requires other considerations such as improving tool interface/warning design and enhancing users' knowledge of phishing.