Detection and Control of Phishing Techniques

被引:0
|
作者
Sastoque Mesa, Diana [1 ]
Botero Tabares, Ricardo [2 ,3 ]
机构
[1] Tecnol Antioquia Inst Univ, Seguridad Informac, Medellin, Colombia
[2] Tecnol Antioquia Inst Univ, Area Sist & Computac, Medellin, Colombia
[3] Tecnol Antioquia Inst Univ, Fac Ingn, Medellin, Colombia
来源
CUADERNO ACTIVA | 2015年 / 07期
关键词
cybercrime; phishing; anti -phishing techniques;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The globalization of the economy, and the widespread use of Internet have led to new spaces for committing fraud in computer systems with the use of new technologies. This article describes, in general, major computer-related crimes, such as unlawful interception of e-mail correspondence, the unauthorized use of cards, and false PINs, emphasizing phishing as one of fastest-growing scams in recent years. The main ways to phish customers and users are described through the creation of a fake web site similar to the original site. Related studies are discussed, such as the cloning of profiles on social networks, the design of a prototype system that can be used by users to investigate whether they have been victims of a phishing attack and malware that attacks on social networks. Finally, some techniques for detecting phishing are identified.
引用
收藏
页码:75 / 81
页数:7
相关论文
共 50 条
  • [41] A Survey of Phishing Email Filtering Techniques
    Almomani, Ammar
    Gupta, B. B.
    Atawneh, Samer
    Meulenberg, A.
    Almomani, Eman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2070 - 2090
  • [42] URL Phishing Detection using Machine Learning Techniques based on URLs Lexical Analysis
    Abutaha, Mohammed
    Ababneh, Mohammad
    Mahmoud, Khaled
    Baddar, Sherenaz Al-Haj
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 147 - 152
  • [43] A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
    Salloum, Said
    Gaber, Tarek
    Vadera, Sunil
    Shaalan, Khaled
    IEEE ACCESS, 2022, 10 : 65703 - 65727
  • [44] Preventive Techniques of Phishing Attacks in Networks
    Adil, Muhammad
    Khan, Rahim
    Ul Ghani, M. Ahmad Nawaz
    2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
  • [45] On the effectiveness of techniques to detect phishing sites
    Ludl, Christian
    McAllister, Sean
    Kirda, Engin
    Kruegel, Christopher
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 20 - +
  • [46] Countermeasure Techniques for Deceptive Phishing Attack
    Huang, Huajun
    Tan, Junshan
    Liu, Lingxi
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 636 - 641
  • [47] A Review of Phishing Detection Research
    Xie, Lixia
    Zhang, Hao
    Yang, Hongyu
    Hu, Ze
    Cheng, Xiang
    Zhang, Liang
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2024, 53 (06): : 883 - 899
  • [48] Phishing Detection: A Literature Survey
    Khonji, Mahmoud
    Iraqi, Youssef
    Jones, Andrew
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2091 - 2121
  • [49] A Review of Phishing Detection Technology
    Xu, Huan-xiao
    Lei, Li-ting
    Xu, Hui
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND TECHNOLOGY (ICCST 2015), 2015, : 487 - 491
  • [50] Deep Learning for Phishing Detection
    Yao, Wenbin
    Ding, Yuanhao
    Li, Xiaoyong
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 645 - 650