scholarly journals Phishing Mitigation Techniques: A Literature Survey

2021 ◽  
Vol 13 (2) ◽  
pp. 63-72
Author(s):  
Wosah Peace Nmachi ◽  
Thomas Win

Email is a channel of communication which isconsideredto be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about email is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have beenlimited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with anexplorationintohow phishing detection can be improved.

2021 ◽  
Author(s):  
Wosah Peace Nmachi ◽  
Thomas Win

Email is a channel of communication which is increasingly used by individuals and organisations for exchange of information. It is considered to be a confidential medium of communication but this is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an exploration into how phishing detection can be improved.


Author(s):  
A. A. Goncharov ◽  
◽  
A. I. Boyko ◽  

The relevance of scientific research is caused primarily by the general transition of the society to the funds’ transfer network. Physical money is replaced by virtual one, the access to which is granted remotely. Therefore, in some situations, a lawbreaker can gain possession of non-cash resources far easier than stealing the cash of a possible victim. For the past two decades, lawbreakers successfully apply lots of ways allowing a lawbreaker both to possess personal information of another person – bank cardholder and, subsequently, to steal money from a holder’s account. The paper determines the objective signs of a crime against property and the list of attributes typical for stealing money funds from a bank card. The authors distinguish the objective signs of two bodies of a crime, which can fall within the definition of embezzlement from a bank card: a theft from a bank account, and fraud using electronic payment facilities. The authors conclude that the embezzlement from a bank card throw the commission of fraudulent acts is possible only when interacting with a third party. The actual presence of another person (a victim or an employee of credit, bank, commercial, or other organization) and the interaction of a criminal with this person is a prerequisite for classifying a crime as a fraud. Any actions aimed at the unlawful seizure of non-cash monetary assets and not accompanied by direct contact with a third party should be classified as theft.


Author(s):  
Aarti Chile ◽  
Mrunal Jadhav ◽  
Shital Thakare ◽  
Prof. Yogita Chavan

A fraud attempt to get sensitive and personal information like password, username, and bank details like credit/debit card details by masking as a reliable organization in electronic communication. The phishing website will appear the same as the legitimate website and directs the user to a page to enter personal details of the user on the fake website. Through machine learning algorithms one can improve the accuracy of the prediction. The proposed method predicts the URL based phishing websites based on features and also gives maximum accuracy. This method uses uniform resource locator (URL) features. We identified features that phishing site URLs contain. The proposed method employs those features for phishing detection. The proposed system predicts the URL based phishing websites with maximum accuracy.


Author(s):  
Siddhartha Kosti ◽  
Jitender Kundu

This chapter deals with the implementation of the SWOT analysis during the literature survey. Implementation of SWOT analysis can help in identifying the strengths, weaknesses, and opportunities related to the topic/literature and can determine the subject applications, its scopes, and can also help in deciding the aims and objectives of the further study. After the identification of the weakness and opportunities, one can easily determine the research gaps. SWOT analysis can also help in deciding the methodologies, tools, and techniques to use for the solution of the problem. Different examples are considered to illustrate the application of SWOT in the literature analysis.


2019 ◽  
Vol 8 (3) ◽  
pp. 5626-5629

Attacks are many types to disturb the network or any other websites. Phishing attacks (PA) are a type of attacks which attack the website and damage the website and may lose the data. Many types of research have been done to prevent the attacks. To overcome this, in this paper, the integrated phishing attack detection system which is adopted with SVM classifier is implemented to detect phishing websites. Phishing is the cyber attack that will destroy the website and may attack with the virus. There are two parameters that can detect the final phishing detection rate such as Identity, and security. Phishing attacks also occur in various banking and e-commerce websites. This paper deals with the UCL machine learning phishing dataset which consists of 32 attributes. The proposed algorithm implements on this dataset and shows the performance.


2019 ◽  
Vol 13 (5) ◽  
pp. 114
Author(s):  
Ali Mohammad H. Al-Ibrahim

With the development of Internet technology and electronic transactions, the problem of software security has become a reality that must be confronted and is no longer an option that can be abandoned. For this reason, software must be protected in all available ways. Where attackers use many methods to enable them to penetrate systems, especially those that rely on the Internet and hackers try to identify the vulnerabilities in the programs and exploit them to enter the database and steal sensitive information. Electronic phishing is a form of illegal access to information, such as user names, passwords, credit card details, etc. Where attackers use different types of tricks to reveal confidential user information. Where attacks appear as links and phishing is done by clicking on the links contained in them. This leads to obtaining confidential information by using those false emails, redirecting the user without his knowledge to a site similar to the site he wants to access and capturing information. The main purpose of this paper is to protect users from malicious pages that are intended to steal personal information. Therefore, an electronic phishing detection algorithm called the SMO algorithm, which deals only with the properties of links, has been used. Weka was used in the classification process. The samples were the characteristics of the links and they contain a number of sites which were 8266 and the number of phishing sites 4116 and legitimate sites 4150 sites and results were found to be new for the previous algorithms where the real classification rate 99.0202% in the time of 1.68 seconds.


Sign in / Sign up

Export Citation Format

Share Document