We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Review on Phishing Attacks and Various Anti Phishing Techniques

by V. Suganya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 1
Year of Publication: 2016
Authors: V. Suganya
10.5120/ijca2016909084

V. Suganya . A Review on Phishing Attacks and Various Anti Phishing Techniques. International Journal of Computer Applications. 139, 1 ( April 2016), 20-23. DOI=10.5120/ijca2016909084

@article{ 10.5120/ijca2016909084,
author = { V. Suganya },
title = { A Review on Phishing Attacks and Various Anti Phishing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 1 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number1/24454-2016909084/ },
doi = { 10.5120/ijca2016909084 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:46.385327+05:30
%A V. Suganya
%T A Review on Phishing Attacks and Various Anti Phishing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 1
%P 20-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques to protect the information.

References
  1. Engin Kirda and Christopher Kruegel 2005 ,” Protecting Users Against Phishing Attacks with AntiPhish”. Computer Software and Applications Conference, COMPSAC 2005. 29th Annual International (Volume: 1 ).
  2. Madhusudhanan Chandrasekaran Ramkumar Chinchani Shambhu Upadhyaya,” PHONEY: Mimicking User Response to Detect Phishing Attacks”, WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, Pages668-672, IEEE Computer Society Washington
  3. Ying Pan, Xuhua Ding 2006,”Anomaly Based Web Phishing Page Detection”, Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06).
  4. Craig M. McRae Rayford B. Vaughn 2007 ,” Phighting the Phisher:Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks “,Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
  5. Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei Bidgoli 2007, “Learn To Detect Phishing Scams Using Learning and Ensemble Methods”, Proceedings of the 2007 IEEE/WIC/ACM.
  6. Eric Medvet, Engin Kirda, Christopher Kruegel 2008,” Visual-Similarity-Based Phishing Detection” Proceedings of the 4th international conference on Security and privacy in communication netowrks.
  7. Maher Aburrous, M. A. Hossain, Keshav Dahal, Fadi Thabatah 2009,” Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy Data Mining” CyberWorlds, 2009. CW '09.
  8. Brad Wardman, Tommy Stallings, Gary Warner, Anthony Skjellum 2011,” High-Performance Content-Based Phishing Attack Detection” eCrime Researchers Summit (eCrime).
  9. Venkata Prasad Reddy, V. Radha, Manik Jindal 2011,” Client Side protection from Phishing attack” International Journal Of Advanced Engineering Sciences And Technologies Vol No. 3, Issue No. 1, 039 – 045.
  10. Aanchal Jain and Prof. Vineet Richariya 2011,” Implementing a Web Browser with Phishing Detection Techniques” World of Computer Science and Information Technology Journal, Vol. 1, No. 7, 289-291.
  11. Divya James and Mintu Philip 2012,” A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY”International Conference on Power, Signals, Controls and Computation (EPSCICON).
  12. Mohd Mahmood Ali and Lakshmi Rajamani 2012,” APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach” Springer Berlin Heidelberg
  13. Isredza Rahmi A HAMID, Jemal ABAWAJY, Tai-hoon KIM 2013,“Using Feature Selection and Classification Scheme for Automating Phishing Email Detection”  Studies in Informatics and Control 22(1):61-70 · March 2013
  14. Moh'd Iqbal AL Ajlouni1, Wa'el Hadi,Jaber Alwedyan 2013,” Detecting Phishing Websites Using Associative Classification” European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013
  15. Seoung Yeop Na, Hyun Kim and Dong Hoon Lee 2014,” Prevention Schemes Against Phishing Attacks on Internet Banking Systems” International Journal of Advance Soft Computing Application, Vol. 6, No. 1, March 2014 ISSN 2074-8523
  16. ] Nilkesh Surana, Prabhjot Singh, Umesh Warade, Neha Sabe 2015,” Detection and Prevention of Phishing Attacks in Web” International Journal of Scientific Engineering and Technology Research, ISSN 2319-8885 Vol.04,Issue.08, April-2015, Pages:1595-1598
Index Terms

Computer Science
Information Sciences

Keywords

Phishing Email Threat.