A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy

被引:0
作者
Richa Goenka
Meenu Chawla
Namita Tiwari
机构
[1] Maulana Azad National Institute of Technology,CSE Department
来源
International Journal of Information Security | 2024年 / 23卷
关键词
Phishing; Phishing techniques; Phishing circulation mediums; Intended targets; Phishing countermeasures;
D O I
暂无
中图分类号
学科分类号
摘要
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards the social and economic well-being of users. The escalation in dependency upon the internet for meeting daily chores has made them vulnerable to falling prey to the ever-evolving menace of phishing. The objective of this article is: to explore different tactics and motivational factors behind phishing, identify the communication mediums through which phishing is circulated and perform a detailed review along with a comparison of the various surveys in this domain. Another objective is to determine the open research challenges in this genre and to identify the scope of research in the future. An extensive literature survey is performed, which includes articles from eminent online research databases. Barring a few initial articles related to phishing, the articles published in Science Citation/Scopus-indexed journals and survey/review articles published in the last ten years are considered. Highly cited works are given preference. The search query returned numerous articles, which were narrowed by title screening. Further screening of articles was performed by reading the abstract and eliminating the articles related to user-oriented phishing interventions. Eventually, 25 survey articles were shortlisted to be surveyed. This article is an effort to provide a novel taxonomy of phishing to academia that would assist in identifying the sections where phishing countermeasures are inadequate.
引用
收藏
页码:819 / 848
页数:29
相关论文
共 257 条
  • [1] Williams EJ(2018)Exploring susceptibility to phishing in the workplace Int. J. Hum. Comput. Stud. 120 1-13
  • [2] Hinds J(2021)Adoption of email anti-spoofing schemes: a large scale analysis IEEE Trans. Netw. Serv. Manag. 18 3184-3196
  • [3] Joinson AN(2020)Impact of digital surge during COVID-19 pandemic: a viewpoint on research and practice Int. J. Inf. Manag. 55 121916-121929
  • [4] Maroofi S(2021)Covid-19 and phishing: effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic IEEE Access 9 2091-2121
  • [5] Korczyński M(2021)Cyber security in the age of Covid-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic Comput. Secur. 105 2070-2090
  • [6] Hölzel A(2013)Phishing detection: a literature survey IEEE Commun. Surv. Tutor. 15 1-24
  • [7] Duda A(2013)A survey of phishing email filtering techniques IEEE Commun. Surv. Tutor. 15 3-13
  • [8] Pandey N(2015)Tutorial and critical analysis of phishing websites methods Comput. Sci. Rev. 17 6266-6284
  • [9] Pal A(2016)Recent survey of various defense mechanisms against phishing attacks J. Inf. Priv. Secur. 12 160-196
  • [10] Abroshan H(2016)A survey and classification of web phishing detection schemes Secur. Commun. Netw. 9 3629-3654