A survey of phishing attacks: Their types, vectors and technical approaches

被引:130
作者
Chiew, Kang Leng [1 ]
Yong, Kelvin Sheng Chek [1 ]
Tan, Choon Lin [1 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Sarawak, Malaysia
关键词
Information security threats; Advanced phishing techniques; Anti-phishing; Attack vector; Taxonomy; Review; SECURITY;
D O I
10.1016/j.eswa.2018.03.050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehensive and easy-to-follow review of these approaches is presented here. The relevant mediums and vectors of these approaches are identified for each approach. The medium is the platform which the approaches reside and the vector is the means of propagation utilised by the phisher to deploy the attack. The paper focuses primarily on the detailed discussion of these approaches. The combination of these approaches that the phishers utilised in conducting their phishing attacks is also discussed. This review will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system. This review creates awareness of these phishing techniques and encourages the practice of phishing prevention among the readers. Furthermore, this review will gear the research direction through the types of phishing, while also allowing the identification of areas where the anti-phishing effort is lacking. This review will benefit not only the developers of anti-phishing techniques but the policy makers as well. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 117 条
[1]  
Akhawe D., 2014, P 8 USENIX WORKSH OF
[2]   A Survey of Phishing Email Filtering Techniques [J].
Almomani, Ammar ;
Gupta, B. B. ;
Atawneh, Samer ;
Meulenberg, A. ;
Almomani, Eman .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04) :2070-2090
[3]  
[Anonymous], 2011, 14 INT C EXT DAT TEC, DOI DOI 10.1145/1951365.1951432
[4]  
[Anonymous], 2013, TECHNICAL REPORT
[5]  
[Anonymous], SHORT MESSAGE SERVIC
[6]  
[Anonymous], 2014, Crime Science, DOI [10.1186/s40163-014-0009-y, DOI 10.1186/S40163-014-0009-Y]
[7]  
[Anonymous], 2000, P 7 ACM C COMPUTER C
[8]  
APWG, 2017, CISC VIS NETW IND GL
[9]  
Australian Computer Emergency Response Team (AusCERT), 2003, MICR INT EXPL INC DI
[10]  
Banday M. T., 2007, BUSINESS REV FEDERAL, V12, P76