Spear Phishing: Diagnosing Attack Paradigm

被引:0
|
作者
Pande, Deepali N. [1 ]
Voditel, Preeti S. [1 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Dept Comp Applicat, Nagpur, MS, India
关键词
Phishing; spear-phishing; pattern mining; classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet is a rich source of web media and social networking applications. A cluster of users interconnect using those forming mutligroups. But the usage of web resources imprudently is causing doors to phishing, pharming and targeted phishing attacks. Careless use of social networking applications like LinkedIn, pinterest, whatsapp, face book and twitter barely from smart phones have become extrinsic sources for phishing and pharming attacks. Hence, it is essential to understand the pinholes of these attacks and their relationship with variants of user-agents on distributed platform. In this paper, we direct our survey in finding extrinsic porches influential to nasty invasions as attack entry point analysis. Also, we incline our detection considering recursive NM cache poisoning as the source of spear-phish attack. We present a detail analysis to determine spear-phishing. We evaluate and compare the spear phish feature detection attributes with PhishTank, a benchmark dataset.
引用
收藏
页码:2720 / 2724
页数:5
相关论文
共 50 条
  • [31] The Need for New Antiphishing Measures Against Spear-Phishing Attacks
    Allodi, Luca
    Chotza, Tzouliano
    Panina, Ekaterina
    Zannone, Nicola
    IEEE SECURITY & PRIVACY, 2020, 18 (02) : 23 - 34
  • [32] DC Scanner: Detecting Phishing Attack
    Kumar, Binay
    Kumar, Pankaj
    Mundra, Ankit
    Kabra, Shikha
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 271 - 276
  • [33] PhAttApp: A Phishing Attack Detection Application
    Lam, Thuy
    Kettani, Houssain
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, : 154 - 158
  • [34] Countermeasure Techniques for Deceptive Phishing Attack
    Huang, Huajun
    Tan, Junshan
    Liu, Lingxi
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 636 - 641
  • [35] A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
    Tchakounte, Franklin
    Nyassi, Virgile Sime
    Danga, Duplex Elvis Houpa
    Udagepola, Kalum Priyanath
    Atemkeng, Marcellin
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2021, 8 (30) : 1 - 24
  • [36] Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security
    Yasin, Affan
    Fatima, Rubia
    Zheng, Jiangbin
    Afzal, Wasif
    Raza, Shahid
    INFORMATION AND SOFTWARE TECHNOLOGY, 2024, 170
  • [37] Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Lou, Jian
    Vorobeychik, Yevgeniy
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 537 - 543
  • [38] Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
    Xu, Tianhao
    Singh, Kuldeep
    Rajivan, Prashanth
    APPLIED ERGONOMICS, 2023, 108
  • [39] Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups
    Lee, Jaeil
    Lee, Yongjoon
    Lee, Donghwan
    Kwon, Hyukjin
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 80866 - 80872
  • [40] Phishing attack detection using Machine Learning
    Pandiyan S S.
    Selvaraj P.
    Burugari V.K.
    Benadit P J.
    P K.
    Measurement: Sensors, 2022, 24