scholarly journals A Study on Various Phishing Techniques and Recent Phishing Attacks

Author(s):  
Bhuvana ◽  
Arundhathi S Bhat ◽  
Thirtha Shetty ◽  
Mr. Pradeep Naik

Now-a-days internet has become a very unsafe space to deal with. Hackers are constantly trying to gain the user's personal information, and detailed credentials. So many websites on the internet, even though safe, this safety cannot be assured by all websites. These rule breakers avoid abiding by rules, and try to employ methods like trickery and hacking to gain illegal access to private information. T o be able to overcome this problem, we need to first understand the intricacies of how the virus is designed. This paper mainly deals with the different phishing techniques and recent phishing attacks that took place during COVID 19. like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. We have also studied a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website called Convert Redirect. In this paper , we present some phishing examples like Paypal phishing which involves sending an email that fraudulently claims to be from a well known company and Rapidshare Phishing where in the spoofed web page, phishers attempt to confuse their victims just enough to entice them to enter their login name and password. To perform these types of phishing the Phishers uses so many phishing techniques like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. Phishing techniques include the domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform is socially engineered messages. Lexically analyzing the URLs can enhance the performance and help to differentiate between the original email and the phishing URL. As assessed in this study , in addition to textual analysis of phishing URL, email classification is successful and results in a highly precise anti phishing. From the thorough analysis of the research paper, we have understood how phishing attacks work and the different methods employed to carry out the attack. Also, we have studied some of the most recent phishing attacks and measures taken by the authorities to overcome and prevent any such attacks in future.

Author(s):  
Nikhil K ◽  
Dr. Rajesh D S ◽  
Dhanush Raghavan

Phishing is one kind of cyber-attack , it is a most dangerous and common attack to retrieve personal information, account details, credit card credentials, organizational details or password of a client to conduct transactions. Phishing websites seem to like the relevant ones and it is difficult to differentiate among those websites. It is one of the most threatening that every individuals and organization faced. URLs are known as web sites are by which users locate information on the internet. The review creates warning of phishing attacks, detection of phishing attacks and motivate the practice of phishing prevention among the readers. With the huge number of phishing emails or messages received now days, companies or individuals are not able to find all of them.


2021 ◽  
Vol 6 (3) ◽  
Author(s):  
Elizabeth A Amusan ◽  
Oluyinka T Adedeji ◽  
Oluwaseun Alade ◽  
Funmilola A Ajala ◽  
Kayode O Ibidapo

Phishing is a type of cyber-attack where the attacker deploys a combination of social engineering and technological skills to trick users into revealing private information like bank account details, usernames and passwords by creating an imitation of an existing web page. This research developed an Android-based anti-phishing system leveraging on the ubiquity of mobile devices and their increasing applications for business and personal purposes. The system was developed by implementing an end-host based algorithm called the Linkguard algorithm which is effective in detecting and preventing both known and unknown phishing attacks. A total of over 500 links which was a blend of both phishing and non-phishing links were collected from Phishtank and Alexa to validate the proposed system which achieved an accuracy of 96%. It is recommended that concerted efforts should be geared towards continuously sensitizing users to improve their phishing awareness as this cybercrime keeps evolving and users play a very crucial role in mitigating it. Keywords— android, cybercrime, Linkguard algorithm, mobile, phishing 


Author(s):  
Ranaganayakulu Dhanalakshmi ◽  
Chenniappan Chellappan

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In spite of the different possible attacks discussed in later chapters, this chapter can focus on phishing attacks – a form of indirect attacks– such as an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, et cetera. The vulnerabilities on various phishing methods such as domain name spoofing, URL obfuscation, susceptive e-mails, spoofed DNS and IP addresses, and cross site scripting are analyzed, and the chapter concludes that an integrated approach is required to mitigate phishing attacks.


2003 ◽  
Vol 22 (2) ◽  
pp. 87-93
Author(s):  
James Otto ◽  
Mohammad Najdawi ◽  
William Wagner

With the extensive growth of the Internet and electronic commerce, the issue of how users behave when confronted with long download times is important. This paper investigates Web switching behavior. The paper describes experiments where users were subjected to artificially delayed Web page download times to study the impact of Web site wait times on switching behavior. Two hypotheses were tested. First, that longer wait times will result in increased switching behavior. The implication being that users become frustrated with long waiting times and choose to go elsewhere. Second, that users who switch will benefit, in terms of decreased download times, from their decision to switch.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


2002 ◽  
Vol 7 (1) ◽  
pp. 9-25 ◽  
Author(s):  
Moses Boudourides ◽  
Gerasimos Antypas

In this paper we are presenting a simple simulation of the Internet World-Wide Web, where one observes the appearance of web pages belonging to different web sites, covering a number of different thematic topics and possessing links to other web pages. The goal of our simulation is to reproduce the form of the observed World-Wide Web and of its growth, using a small number of simple assumptions. In our simulation, existing web pages may generate new ones as follows: First, each web page is equipped with a topic concerning its contents. Second, links between web pages are established according to common topics. Next, new web pages may be randomly generated and subsequently they might be equipped with a topic and be assigned to web sites. By repeated iterations of these rules, our simulation appears to exhibit the observed structure of the World-Wide Web and, in particular, a power law type of growth. In order to visualise the network of web pages, we have followed N. Gilbert's (1997) methodology of scientometric simulation, assuming that web pages can be represented by points in the plane. Furthermore, the simulated graph is found to possess the property of small worlds, as it is the case with a large number of other complex networks.


2018 ◽  
Vol 22 (2) ◽  
pp. 603-620
Author(s):  
Wei Yuliang ◽  
Zhou Qi ◽  
Lv Fang ◽  
Han Xixian ◽  
Xin Guodong ◽  
...  

2021 ◽  
Author(s):  
Haley Coppins

Celebrities and fans have been researched by scholars throughout the years, with differing opinions regarding their characteristics and relationships. Prior to the development of the internet, fans were characterized by scholars as deranged, hysterical and passive. Their relationships with celebrities were seen as exclusively one-sided and parasocial. Conversely, since the development of the internet fans have been characterized more favourably as active participants. In this paper, I perform a textual analysis of Twitter conversations between bands/artists and fans in an attempt to better understand if and how celebrity-fan interactions have changed from early scholarly interpretations. I argue that Twitter is changing celebrity-fan interactions, not only by encouraging reciprocal interactions but also by enabling more personal, intimate conversations. Twitter is allowing bands and fans to interact in a number of different ways that simultaneously build relationships and serve commercial functions such as promotion. Fans have become more actively involved in content production and powerful in influencing the way bands promote themselves. Used properly, Twitter can be a valuable tool for bands and artists to market themselves.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


Sign in / Sign up

Export Citation Format

Share Document