Corpus ID: 212487773

Detecting and Analyzing Social Network Based Phishing Activities over the Internet to Enhance Cyber Security

@inproceedings{Shaikh2019DetectingAA,
  title={Detecting and Analyzing Social Network Based Phishing Activities over the Internet to Enhance Cyber Security},
  author={F. Shaikh and Harun Hawaldar and Ankita Jangade},
  year={2019}
}
Phishing is an expeditiously growing threat in web world, damaging internet user’s privacy and stealing billions of dollars every year. It is an illegitimate activity which uses a group of technical exploits and social engineering to collect an internet user’s personal information. Different phishing tools and techniques can be identified in various methods of communication like fake websites, emails, instant messages and pop-up messages. Over the time span, a number of research papers have… Expand

References

SHOWING 1-10 OF 32 REFERENCES
A layout-similarity-based approach for detecting phishing pages
TLDR
An extension of the AntiPhish system (called DOMAntiPhish) is presented, which leverages layout similarity information to distinguish between malicious and benign web pages and significantly reduces the false alarm rate. Expand
Defending against phishing attacks: taxonomy of methods, current issues and future directions
TLDR
The history of phishing attacks and the attackers’ motivation in details are discussed and a taxonomy of various types ofphishing attacks is provided to protect users from phishing based on the attacks identified in this taxonomy. Expand
Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks
TLDR
A methodology to develop an intelligent tool and awareness security program to address the risk of phishing through email and the cost of these types of attacks exceeds millions of dollars annually. Expand
“Phish mail guard: Phishing mail detection technique by using textual and URL analysis”
  • J. Hajgude, L. Ragha
  • Computer Science
  • 2012 World Congress on Information and Communication Technologies
  • 2012
TLDR
A technique where the advantages of blacklist, white list and heuristic technique are considered for increasing accuracy and reducing false positive rate is proposed, which will result in a highly accurate anti phishing email classifier. Expand
Phishing counter measures and their effectiveness - literature review
  • S. Purkait
  • Computer Science
  • Inf. Manag. Comput. Secur.
  • 2012
TLDR
The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories and the different approaches proposed so far are all preventive in nature. Expand
Teaching Johnny not to fall for phish
TLDR
The results suggest that, while automated detection systems should be used as the first line of defense against phishing attacks, user education offers a complementary approach to help people better recognize fraudulent emails and websites. Expand
Protecting users against phishing attacks with AntiPhish
TLDR
A novel browser extension, AntiPhish, is presented that aims to protect users against spoofed Web site-based phishing attacks and tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a Web site that is considered un-trusted. Expand
Phishing - A Growing Threat to E-Commerce
TLDR
Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed. Expand
Phishing Attacks Root Causes
TLDR
A cause-and-effect diagram is created to clearly present the categories and factors which make up the root causes of phishing scams and is extendable with additional phishing causes. Expand
Decision strategies and susceptibility to phishing
TLDR
Preliminary analysis of interviews with 20 non-expert computer users to reveal their strategies and understand their decisions when encountering possibly suspicious emails suggests that people can manage the risks that they are most familiar with, but don't appear to extrapolate to be wary of unfamiliar risks. Expand
...
1
2
3
4
...