Different Types of Phishing Attacks and Detection Techniques: A Review

Author(s):  
Kiran D. Tandale ◽  
Sunil N Pawar
2018 ◽  
Vol 25 (3) ◽  
pp. 702-720 ◽  
Author(s):  
Vipin Khattri ◽  
Deepak Kumar Singh

Purpose This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction. Design/methodology/approach This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction. Findings There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud. Research limitations/implications This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system. Practical implications This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system. Originality/value This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.


Phishing is a common attack on credulous people by making them to disclose their unique information using counterfeit websites. The objective of phishing website URLs is to purloin the personal information like user name, passwords and online banking transactions. Phishers use the websites which are visually and semantically similar to those real websites. As technology continues to grow, phishing techniques started to progress rapidly and this needs to be prevented by using anti-phishing mechanisms to detect phishing. Machine learning is a powerful tool used to strive against phishing attacks. This paper surveys the features used for detection and detection techniques using machine learning


Author(s):  
Ruksana Habeeb ◽  
L. C. Manikandan

Technological advancements of various video and image editing tools has reached such a level that the tampering of digital video or image can be performed easily without degrading their quality or leaving any visual evidence. This review paper presents an overview of various types of video forgery and the different types of techniques that are employed for its detection. Passive and active forgery detection techniques are commonly used methods for detecting the tampering in a digital video. Passive and active tampering detection techniques are utilized for detecting the integrity as well as the authenticity of a given video. The aim of this review is to provide some productive information about video tampering attacks for upcoming researchers.


Author(s):  
Abdul Basit ◽  
Maham Zafar ◽  
Xuan Liu ◽  
Abdul Rehman Javed ◽  
Zunera Jalil ◽  
...  

2019 ◽  
Vol 969 ◽  
pp. 128-133 ◽  
Author(s):  
Mohammed Aslam ◽  
Praveen Nagarajan ◽  
Mini Remanan

Structural health monitoring (SHM) and damage detection techniques have recently gained attention in various fields of engineering for preventing catastrophic failures. Among different SHM techniques, Lamb wave propagation methods are widely used as these waves can propagate large distance from a single source. Piezoelectric (PZT) transducers are used here as actuators and sensors to generate and receive wave signals. Most of the studies conducted on wave propagation in plates are by use of conventional d31 mode piezoelectric transducer. However, so far very few studies have been done using other types of PZT transducers. The primary objective of this paper is to determine and study the wave responses in a thin plate using different types of PZT transducers. The results indicate that the d31 and d33 type transducers generate Lamb waves, whereas d24 and d15 type transducers generate shear horizontal waves in two orthogonal directions. The study indicates that each of the transducers has its own directional property. The present study will be helpful for the application of Lamb waves and shear horizontal waves in plate structures


Smart Science ◽  
2013 ◽  
Vol 1 (2) ◽  
pp. 86-93 ◽  
Author(s):  
Chuen-Horng Lin ◽  
Yu-Ching Lin ◽  
Hau-Wei Lee

2011 ◽  
Vol 99-100 ◽  
pp. 1067-1072 ◽  
Author(s):  
Chun Xiao Bao ◽  
Hong Hao ◽  
Zhong Xian Li

Pipelines are regarded as the most cost-effective and the safest choice for transporting oil in bulk. In this study, the significance and necessity of conducting damage detection for onshore pipelines is firstly stated. Then, the limitations of current measures in use in pipeline industry and the inherent difficulty of applying vibration-based damage detection techniques (VBDT) to pipeline structures are addressed. This study focuses on exploring the applicability of an advanced VBDT method, HHT method, to the condition assessment of onshore pipelines. The feasibility and effectiveness of HHT method is verified through numerical study. The result shows that for the cases with single or multi segments of damage which are of the same type or of different types coexist in the structure, the HHT method is capable of providing very good results for the damage detection of pipeline system under ambient excitations. The obtained Hilbert spectrum gives very explicit presentation of the structural response’s energy distribution in both time and frequency domain, the marginal spectrum offers satisfactory result not only for locating the damaged area but also for a rough estimate of damage severity.


Author(s):  
H. H. Ibrahim ◽  
A. E. Hamzah ◽  
H. A. Saeed ◽  
H. H. Qasim ◽  
O. S. Hamed ◽  
...  

With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.


Sign in / Sign up

Export Citation Format

Share Document