Mitigation strategies against the phishing attacks: A systematic literature review

被引:22
|
作者
Naqvi, Bilal [1 ]
Perova, Kseniia [1 ]
Farooq, Ali [2 ,3 ]
Makhdoom, Imran [4 ]
Oyedeji, Shola [1 ]
Porras, Jari [1 ]
机构
[1] LUT Univ, Software Engn, LENS, Lappeenranta, Finland
[2] Hamad Bin Khalifa Univ, Qatar Comp Res Inst, Doha, Qatar
[3] Univ Turku, Dept Comp, Turku, Finland
[4] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
Guidelines and recommendations; Mitigation strategies; Phishing attacks; Systematic; Literature review; GOOGLE-SCHOLAR; WEB; SCIENCE; SCOPUS;
D O I
10.1016/j.cose.2023.103387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The conse-quences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the be-ginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strate-gies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to con-sider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks. & COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:25
相关论文
共 50 条
  • [31] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [32] Protecting users against phishing attacks with AntiPhish
    Kirda, E
    Kruegel, C
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 517 - 524
  • [33] Guarding against web spoofing and phishing attacks
    Bein, Doina
    Bein, Wolfgang W.
    Jolly, Vasu
    Latifi, Shahram
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 106 - 109
  • [34] Detection Technique and Mitigation Against a Phishing Attack
    Fetooh, Haytham Tarek Mohammed
    El-Gayar, M. M.
    Aboelfetouh, A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 177 - 188
  • [35] Security of Connected and Autonomous Vehicles: A Review of Attacks and Mitigation Strategies
    Niroumand, Farahnaz Javidi
    Bonab, Parisa Ansari
    Sargolzaei, Arman
    SOUTHEASTCON 2024, 2024, : 1197 - 1204
  • [36] Supply chain disruption mitigation strategies to advance future research agenda: A systematic literature review
    Sudan, Tapas
    Taggar, Rashi
    Jena, Pabitra Kumar
    Sharma, Deepika
    JOURNAL OF CLEANER PRODUCTION, 2023, 425
  • [37] A Literature Survey on Social Engineering Attacks: Phishing Attack
    Gupta, Surbhi
    Singhal, Abhishek
    Kapoor, Akanksha
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 537 - 540
  • [38] A Systematic Literature Review of Inter-Service Security Threats and Mitigation Strategies in Microservice Architectures
    Haindl, Philipp
    Kochberger, Patrick
    Sveggen, Markus
    IEEE ACCESS, 2024, 12 : 90252 - 90286
  • [39] Gemini: An Emergency Line of Defense against Phishing Attacks
    Xu, Zhang
    Wang, Haining
    Jajodia, Sushil
    2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 11 - 20
  • [40] Three phase checking against phishing and pharming attacks
    Mahmood, Omer
    Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute: INNOVATION & SERVICE EXCELLENCE FOR COMPETITIVE ADVANTAGE IN THE GLOBAL ENVIRONMENT, 2006, : 209 - 212