CFP last date
20 January 2025
Reseach Article

Study of Phishing Attacks and Preventions

by Tenzin Dakpa, Peter Augustine
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 2
Year of Publication: 2017
Authors: Tenzin Dakpa, Peter Augustine
10.5120/ijca2017913461

Tenzin Dakpa, Peter Augustine . Study of Phishing Attacks and Preventions. International Journal of Computer Applications. 163, 2 ( Apr 2017), 5-8. DOI=10.5120/ijca2017913461

@article{ 10.5120/ijca2017913461,
author = { Tenzin Dakpa, Peter Augustine },
title = { Study of Phishing Attacks and Preventions },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 2 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number2/27365-2017913461/ },
doi = { 10.5120/ijca2017913461 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:02.540490+05:30
%A Tenzin Dakpa
%A Peter Augustine
%T Study of Phishing Attacks and Preventions
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 2
%P 5-8
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet is a great discovery for ordinary citizens correspondence. People with criminal personality have found a method for taking individual data without really meeting them and with minimal danger of being gotten. It is called Phishing. Phishing represents a huge threat to the web based business industry. Not just does it smash the certainty of clients towards online business, additionally causes electronic administration suppliers colossal financial misfortune. Subsequently, it is fundamental to think about phishing. This paper gives mindfulness about Phishing assaults and hostile to phishing apparatuses.

References
  1. S.Arun, D.Ananda, T.Selvaprabhu, B.Sivakumar, P.Revathi, and H.Shine, “Detecting Phishing Attacks In Purchasing Process Through Proactive Approach,” Adv. Comput. an Int. J., vol. 3, no. 3, pp. 81–93, 2012.
  2. Q. Ma, “The process and characteristics of phishing attacks - A small international trading company case study,” J. Technol. Res., vol. 4, pp. 1–16, 2013.
  3. A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, “A survey of phishing email filtering techniques,” IEEE Commun. Surv. Tutorials, vol. 15, no. 4, pp. 2070–2090, 2013.
  4. E. Kirda and C. Kruegel, “Protecting Users Against Phishing Attacks with AntiPhish.”
  5. G. M. J, M. M. Mohideen, and S. B. N, “E-Mail Phishing - An open threat to everyone,” vol. 4, no. 2, pp. 2–5, 2014.
  6. M. N. Banu, M. A. M. C. Engineering, J. Mohamed, and C. Autonomous, “A Comprehensive Study of Phishing Attacks,” vol. 4, no. 6, pp. 783–786, 2013.
  7. U. Odaro and B. G. Sanders, “Social Engineering : Phishing for a Solution Research methodology,” pp. 88–96, 2007.
  8. R. Damodaram, “Study on phishing attacks and antiphishing tools,” pp. 700–705, 2016.
  9. M. Chawla, “A Survey of Phishing Attack Techniques,” vol. 93, no. 3, pp. 1–4, 2014.
  10. V. Antony and D. James, “A Survey of Online Detection and Prevention of Phishing Attacks,” vol. 4, no. 8, pp. 4–6, 2013.
  11. T. M. Incorporated, “Spear-Phishing Email : Most Favored APT Attack Bait,” 2012.
  12. J. Chhikara and M. Rani, “International Journal of Advanced Research in Phishing & Anti-Phishing Techniques : Case Study Phishing attacks Exploit Based,” vol. 3, no. 5, pp. 458–465, 2013.
  13. M. Security, “Agenda – Phishing Intro.”
  14. R. Gonzalez and M. E. Locasto, “An interdiscplinary study of phishing and spear-phishing attacks .,” pp. 1–3.
  15. V. Suganya, “A Review on Phishing Attacks and Various Anti Phishing Techniques,” vol. 139, no. 1, pp. 20–23, 2016.
  16. I. J. C. Network, R. Gupta, and P. K. Shukla, “Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System,” no. November, pp. 70–77, 2015.
  17. C. Science and M. Studies, “Development Review on Phishing : A Computer Security Threat,” pp. 55–64, 2014.
  18. ]“journal8.pdf.crdownload.”
  19. K. R. Sahu, “A Survey on Phishing Attacks,” vol. 88, no. 10, pp. 42–45, 2014.
  20. N. Suryavanshi, M. Pradesh, A. Jain, and M. Pradesh, “A Review of Various Techniques for Detection and Prevention for Phishing Attack,” pp. 41–46.
Index Terms

Computer Science
Information Sciences

Keywords

Phishing Phishing Types Prevention of Phishing Anti-phishing tool.