Detection and Control of Phishing Techniques

被引:0
|
作者
Sastoque Mesa, Diana [1 ]
Botero Tabares, Ricardo [2 ,3 ]
机构
[1] Tecnol Antioquia Inst Univ, Seguridad Informac, Medellin, Colombia
[2] Tecnol Antioquia Inst Univ, Area Sist & Computac, Medellin, Colombia
[3] Tecnol Antioquia Inst Univ, Fac Ingn, Medellin, Colombia
来源
CUADERNO ACTIVA | 2015年 / 07期
关键词
cybercrime; phishing; anti -phishing techniques;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The globalization of the economy, and the widespread use of Internet have led to new spaces for committing fraud in computer systems with the use of new technologies. This article describes, in general, major computer-related crimes, such as unlawful interception of e-mail correspondence, the unauthorized use of cards, and false PINs, emphasizing phishing as one of fastest-growing scams in recent years. The main ways to phish customers and users are described through the creation of a fake web site similar to the original site. Related studies are discussed, such as the cloning of profiles on social networks, the design of a prototype system that can be used by users to investigate whether they have been victims of a phishing attack and malware that attacks on social networks. Finally, some techniques for detecting phishing are identified.
引用
收藏
页码:75 / 81
页数:7
相关论文
共 50 条
  • [1] Walkthrough phishing detection techniques
    Singh, Tejveer
    Kumar, Manoj
    Kumar, Santosh
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [2] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [3] A Survey on Phishing Emails Detection Techniques
    Muneer, Amgad
    Ali, Rao Faizan
    Al-Sharai, Abdo Ali
    Fati, Suliman Mohamed
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 144 - 149
  • [4] An overview of phishing attacks and their detection techniques
    Dadkhah M.
    Jazi M.D.
    Mobarakeh M.S.
    Shamshirband S.
    Wang X.
    Raste S.
    Dadkhah, Mehdi (dadkhah80@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 187 - 195
  • [5] A Comparative Analysis of Phishing Detection and Prevention Techniques
    Sharma, Shivangi
    Kalra, Sheetal
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (08): : 371 - 384
  • [6] A systematic literature review on phishing website detection techniques
    Safi, Asadullah
    Singh, Satwinder
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 590 - 611
  • [7] Performance Study of Classification Techniques for Phishing URL Detection
    Pradeepthi, K., V
    Kannan, A.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 135 - 139
  • [8] Phishing Email Detection Using Robust NLP Techniques
    Egozi, Gal
    Verma, Rakesh
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 7 - 12
  • [9] Phishing Email Detection Using Machine Learning Techniques
    Alattas, Hussain
    Aljohar, Fay
    Aljunibi, Hawra
    Alweheibi, Muneera
    Alrashdi, Rawan
    Al Azman, Ghadeer
    Alharby, Abdulrahman
    Nagy, Naya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 678 - 685
  • [10] A Comprehensive Survey of Recent Phishing Attacks Detection Techniques
    Priya, S.
    Gutema, Danat
    Singh, Shweta
    2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,