A Comparative Analysis of Phishing Detection and Prevention Techniques

被引:3
|
作者
Sharma, Shivangi [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci, Reg Campus, Jalandhar, India
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2016年 / 9卷 / 08期
关键词
plashing; security; social engineering; phising prevention; phishing detection;
D O I
10.14257/ijgdc.2016.9.8.32
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Phishing assaults use websites and email messages similar to a familiar and genuine organization, so as to trick users into giving their financial or personal information online at the illegal websites. Phishing assaults look out at the various weak points that are present in systems and frameworks because of the human factor. There exist numerous cyber-attacks which are spread through different methods or schemes. They utilize these shortcomings found in end users, thus making the users as the most vulnerable component in terms of security. The phishing problem is extensive, expansive and till now there is no single answer to alleviate all the existing weak points effectively. This leads to implementation of multiple techniques to reduce specific attacks. This paper surveys the literature on the recently proposed anti-phishing techniques designed to detect and prevent phishing.
引用
收藏
页码:371 / 384
页数:14
相关论文
共 50 条
  • [1] Comparative Analysis of Mobile Phishing Detection and Prevention Approaches
    Choudhary, Neelam
    Jain, Ankit Kumar
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 349 - 356
  • [2] Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis
    Nagy, Naya
    Aljabri, Malak
    Shaahid, Afrah
    Ahmed, Amnah Albin
    Alnasser, Fatima
    Almakramy, Linda
    Alhadab, Manar
    Alfaddagh, Shahad
    SENSORS, 2023, 23 (07)
  • [3] Mobile phishing websites detection and prevention using data mining techniques
    Yousif H.
    Al-Saedi K.H.
    Al-Hassani M.D.
    Int. J. Interact. Mob. Technol., 2019, 10 (205-213): : 205 - 213
  • [4] Comparative Analysis of Undersampling, Oversampling, and SMOTE Techniques for Addressing Class Imbalance in Phishing Website Detection
    Omari, Kamal
    Taoussi, Chaimae
    Oukhatar, Ayoub
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 751 - 757
  • [5] Walkthrough phishing detection techniques
    Singh, Tejveer
    Kumar, Manoj
    Kumar, Santosh
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [6] Detection and Control of Phishing Techniques
    Sastoque Mesa, Diana
    Botero Tabares, Ricardo
    CUADERNO ACTIVA, 2015, (07): : 75 - 81
  • [7] A COMPARATIVE ANALYSIS AND AWARENESS SURVEY OF PHISHING DETECTION TOOLS
    Sharma, Himani
    Meenakshi, Er.
    Bhatia, Sandeep Kaur
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1437 - 1442
  • [8] Online detection and prevention of phishing attacks
    Institute of Communications Engineering, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    Jiefangjun Ligong Daxue Xuebao, 2007, 2 (133-138): : 133 - 138
  • [9] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [10] Comparative analysis of machine learning algorithms in detection of phishing websites
    Kosan, Muhammed Ali
    Yildiz, Oktay
    Karacan, Hacer
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 276 - 282