A Comprehensive Survey of Recent Phishing Attacks Detection Techniques

被引:0
|
作者
Priya, S. [1 ,2 ]
Gutema, Danat [3 ]
Singh, Shweta [2 ,4 ]
机构
[1] Manipal Inst Technol Bengaluru, Dept Informat Technol, Bengaluru, India
[2] Manipal Acad Higher Educ, Manipal, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Techno, Dept CSE, Morai, India
[4] Manipal Inst Technol Bengaluru, Dept ECE, Bengaluru, India
来源
2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024 | 2024年
关键词
Website Phishing; Feature Selection; Identity Theft; Online Security; and Neural Network;
D O I
10.1109/CITIIT61487.2024.10580446
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks lead to fraudulent acquisition of user credentials, which is turn result in potential harm to reputation and financial security of individuals and organization. The initial instances of phishing attacks emerged in mid of 1990, when a group of hackers impersonated AOL employees through instant messages and emails, aiming to steal passwords and hijack accounts. Over the past two decades, the number of internet users has consistently grown, which has consequently led to an increase in attackers employing various technologies, software, and malicious tools. The proliferation of devices such as computers and smartphones has further contributed to the rapid rise of phishing attacks. These attacks can lead to severe financial theft and pose a significant risk to the reputation of organizations. To counter this threat, numerous techniques and algorithms have been developed and implemented. This paper explores the different detection methods, providing an analysis of their strengths and limitations.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Comprehensive Survey on Shadow Detection Techniques
    Panchal, Monali H.
    Gamit, Nikunj C.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2249 - 2253
  • [22] A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques
    Lin, Haiping
    Wu, Chengwen
    Masdari, Mohammad
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [23] A Comprehensive Survey of Distributed Defense Techniques against DDoS Attacks
    Sachdeva, Monika
    Singh, Gurvinder
    Kumar, Krishan
    Singh, Kuldip
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 7 - 15
  • [24] Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey
    Sundar, Agnideven Palanisamy
    Li, Feng
    Zou, Xukai
    Gao, Tianchong
    Russomanno, Evan D.
    IEEE ACCESS, 2020, 8 : 171703 - 171715
  • [25] Phishing Detection: A Literature Survey
    Khonji, Mahmoud
    Iraqi, Youssef
    Jones, Andrew
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2091 - 2121
  • [26] Phishing environments, techniques, and countermeasures: A survey
    Aleroud, Ahmed
    Zhou, Lina
    COMPUTERS & SECURITY, 2017, 68 : 160 - 196
  • [27] Walkthrough phishing detection techniques
    Singh, Tejveer
    Kumar, Manoj
    Kumar, Santosh
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [28] Detection and Control of Phishing Techniques
    Sastoque Mesa, Diana
    Botero Tabares, Ricardo
    CUADERNO ACTIVA, 2015, (07): : 75 - 81
  • [29] A Survey of Phishing Email Filtering Techniques
    Almomani, Ammar
    Gupta, B. B.
    Atawneh, Samer
    Meulenberg, A.
    Almomani, Eman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2070 - 2090
  • [30] A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
    Goenka, Richa
    Chawla, Meenu
    Tiwari, Namita
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 819 - 848