A recent review of conventional vs. automated cybersecurity anti-phishing techniques

被引:56
作者
Qabajeh, Issa [2 ]
Thabtah, Fadi [1 ]
Chiclana, Francisco [2 ]
机构
[1] Manukau Inst Technol, Digital Technol Dept, Auckland, New Zealand
[2] De Montfort Univ, Ctr Computat Intelligence, Leicester, Leics, England
关键词
Classification; Computer security; Phishing; Machine learning; Web security; Security awareness; CLASSIFICATION;
D O I
10.1016/j.cosrev.2018.05.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of electronic and mobile commerce, massive numbers of financial transactions are conducted online on daily basis, which created potential fraudulent opportunities. A common fraudulent activity that involves creating a replica of a trustful website to deceive users and illegally obtain their credentials is website phishing. Website phishing is a serious online fraud, costing banks, online users, governments, and other organisations severe financial damages. One conventional approach to combat phishing is to raise awareness and educate novice users on the different tactics utilised by phishers by conducting periodic training or workshops. However, this approach has been criticised of being not cost effective as phishing tactics are constantly changing besides it may require high operational cost. Another anti-phishing approach is to legislate or amend existing cyber security laws that persecute online fraudsters without minimising its severity. A more promising anti-phishing approach is to prevent phishing attacks using intelligent machine learning (ML) technology. Using this technology, a classification system is integrated in the browser in which it will detect phishing activities and communicate these with the end user. This paper reviews and critically analyses legal, training, educational and intelligent anti-phishing approaches. More importantly, ways to combat phishing by intelligent and conventional are highlighted, besides revealing these approaches differences, similarities and positive and negative aspects from the user and performance prospective. Different stakeholders such as computer security experts, researchers in web security as well as business owners may likely benefit from this review on website phishing. (c) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 64 条
[1]  
Abdelhamid Neda, 2015, Applied Computing and Informatics, V11, P29, DOI 10.1016/j.aci.2014.07.002
[2]   Associative Classification Approaches: Review and Comparison [J].
Abdelhamid, Neda ;
Thabtah, Fadi .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2014, 13 (03)
[3]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[4]  
Aburrous Maher, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P176, DOI 10.1109/ITNG.2010.117
[5]   Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [J].
Aburrous, Maher ;
Hossain, M. A. ;
Dahal, Keshav ;
Thabtah, Fadi .
COGNITIVE COMPUTATION, 2010, 2 (03) :242-253
[6]   A Survey of Phishing Email Filtering Techniques [J].
Almomani, Ammar ;
Gupta, B. B. ;
Atawneh, Samer ;
Meulenberg, A. ;
Almomani, Eman .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04) :2070-2090
[7]  
[Anonymous], 2005, P 3 IEEE INT C COMP
[8]  
[Anonymous], P 7 IEEE INT C INF T
[9]  
[Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
[10]  
[Anonymous], P KDD