CFP last date
20 January 2025
Reseach Article

A Survey of Phishing Attack Techniques

by Minal Chawla, Siddarth Singh Chouhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 3
Year of Publication: 2014
Authors: Minal Chawla, Siddarth Singh Chouhan
10.5120/16197-5460

Minal Chawla, Siddarth Singh Chouhan . A Survey of Phishing Attack Techniques. International Journal of Computer Applications. 93, 3 ( May 2014), 32-35. DOI=10.5120/16197-5460

@article{ 10.5120/16197-5460,
author = { Minal Chawla, Siddarth Singh Chouhan },
title = { A Survey of Phishing Attack Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 3 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number3/16197-5460/ },
doi = { 10.5120/16197-5460 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:53.150484+05:30
%A Minal Chawla
%A Siddarth Singh Chouhan
%T A Survey of Phishing Attack Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 3
%P 32-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now in a day's phishing is a special type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, transaction or password data to what they think is their service provider's website. Phishing has two techniques, deceptive phishing and malware – based phishing. Here we focus on deceptive phishing using social engineering schemes. To protect users against phishing, various anti-phishing techniques have been proposed. In this paper we have reviewed various phishing and anti-phishing methods for detecting and preventing phishing attack.

References
  1. Ammar Almomani, B. B. Gupta, Samer Atawneh, Meulenberg, and Eman Almomani "A Survey of Phishing Email Filtering Techniques" IEEE Communications Surveys & Tutorials, Vol. 15, No. 4, 2013.
  2. T. Balamuralikrishna, N. raghavendrasai, M. Satya Sukumar "Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching" International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
  3. A. V. R. Mayuri "Phishing Detection based on Visual-Similarity" International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
  4. Ahmed Abbasi, Fatemeh "Mariam" Zahedi and Yan Chen "Impact of Anti-Phishing Tool Performance on Attack Success Rates" 978-1-4673-2104-4/12/©2012 IEEE
  5. Weiwei Zhuang1,2, Qingshan Jiang2,3*, Tengke Xiong2 "An Intelligent Anti-phishing Strategy Model for Phishing Website Detection" 1545-0678/12 © 2012 IEEE.
  6. Mallikka Rajalingam, Saleh Ali Alomari, Putra Sumari "Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages" International Journal of Computer Science and Security (IJCSS), Volume (6): 2012.
  7. Shivender Singh, Anil K. Sarje, Manoj Misra "Client-Side Counter Phishing Application using Adaptive Neuro-Fuzzy Inference System" 978-0-7695-4850-0/12 © 2012 IEEE.
  8. Madhuresh Mishra, Gaurav, Anurag Jain "A Preventive Anti-Phishing Technique using Code word" International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4248 – 4250.
  9. Mahmoud Khonji, Youssef Iraqi, Andrew Jones "Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework" 978-1-908320-00-1/11© 2011 IEEE.
  10. Maher Aburrous, M. A. Hossain, Fadi Thabatah, Keshav Dahal "Intelligent Phishing Website Detection System using Fuzzy Techniques".
  11. V. Shreeram, M. Suban, P. Shanthi, K. Manjula, "Anti-phishing detection of phishing attacks using Genetic Algorithm" 978-1-4244-7770-8/10/ ©2010 IEEE.
  12. Sadia Afroz, Rachel Greenstadt "PhishZoo: Detecting Phishing Websites By Looking at Them".
  13. Michael Atighetchi, Partha Pal "Attribute-based Prevention of Phishing Attacks" 978-1-4673-2104-4/12/ ©2012 IEEE.
  14. Huajun Huang, Junshan Tan, Lingxi Liu "Countermeasure Techniques for Deceptive Phishing Attack" 978-0-7695-3687-3/09 © 2009 IEEE.
  15. Shinta Nakayama and Hiroshi Yoshiura, Isao Echizen "Preventing False Positives in Content-Based Phishing Detection" 978-0-7695-3762-7/09 $26. 00 © 2009 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Survey Phishing