Anti-phishing: A comprehensive perspective

被引:2
|
作者
Varshney, Gaurav [1 ]
Kumawat, Rahul [2 ]
Varadharajan, Vijay [3 ]
Tupakula, Uday [3 ]
Gupta, Chandranshu [1 ]
机构
[1] Indian Inst Technol Jammu, Jammu, India
[2] Amazon Dev Ctr, Chennai, India
[3] Univ Newcastle, Callaghan, Australia
关键词
Anti-phishing; Phishing; Deception; Cyber laws; Social and cognitive factors; WEBSITES; AUTHENTICATION; BEHAVIOR; SCHEME; SOK;
D O I
10.1016/j.eswa.2023.122199
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing is a form of deception technique that attackers often use to acquire sensitive information related to individuals and organizations fraudulently. Although Phishing attacks have been known for more than two decades, and there is ongoing research for developing effective techniques against these attacks, the increasing trend of attacks confirms the lack of robust solutions and techniques against these attacks. According to Trend Micro, over 90 percent of all Cybersecurity attacks begin with spear Phishing emails and hence there is a need for comprehensive research in the area of anti-Phishing to improve the overall Cybersecurity landscape. This paper, therefore, performs a comprehensive study and analysis of past research work in anti-Phishing. The survey also tries to study various relationships such as those between the Phishers and the motives behind Phishing and explores/assesses various tactics that are employed for launching Phishing attacks. Highlighting the role of social and cognitive factors in the success of a Phishing attack which was not focused on in earlier reviews, is one of the major contributions of this work. The paper also provides a detailed understanding of the types of Phishers and the type of Phishing performed by them with a comprehensive classification of antiPhishing detection/prevention/awareness solutions through a systematic literature review. The contributions of leading organizations and their active role through various anti-Phishing products are also discussed in this paper to bring light to the research and development happening in the industry with respect to anti-Phishing. Finally, the cyber laws to handle Phishing attacks in various countries have been presented for readers' interest. We believe this survey brings new knowledge and a comprehensive perspective to its readers from academia and industry to explore new horizons for research activities in anti-Phishing.
引用
收藏
页数:34
相关论文
共 50 条
  • [1] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    [J]. SN Computer Science, 2020, 1 (1)
  • [2] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [3] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [4] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [5] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    [J]. 3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185
  • [6] Email Anti-Phishing Detection Application
    Helmi, Rabab Alayham Abbas
    Ren, Chua Shang
    Jamal, Arshad
    Abdullah, Muhammad Irsyad
    [J]. 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 264 - 267
  • [7] A framework for assessment of anti-phishing preparedness
    Leung, Alvin Chung Man
    Bose, Indranil
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1020 - +
  • [8] Anti-Phishing Awareness Delivery Methods
    Darem, Abdulbasit
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7944 - 7949
  • [9] Time Up for Phishing with Effective Anti-Phishing Research Strategies
    Chaudhary, Sunil
    Berki, Eleni
    Li, Linfeng
    Valtanen, Juri
    [J]. INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2015, 6 (02) : 49 - 64
  • [10] Anti-phishing by smart mobile device
    Han, Weili
    Wang, Yi
    Cao, Ye
    Zhou, Jiping
    Wang, Lixing
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 295 - 300