CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Review of Exposure and Avoidance Techniques for Phishing Attack

by Kanchan Meena, Tushar Kanti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 5
Year of Publication: 2014
Authors: Kanchan Meena, Tushar Kanti
10.5120/18748-0003

Kanchan Meena, Tushar Kanti . A Review of Exposure and Avoidance Techniques for Phishing Attack. International Journal of Computer Applications. 107, 5 ( December 2014), 27-31. DOI=10.5120/18748-0003

@article{ 10.5120/18748-0003,
author = { Kanchan Meena, Tushar Kanti },
title = { A Review of Exposure and Avoidance Techniques for Phishing Attack },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 5 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number5/18748-0003/ },
doi = { 10.5120/18748-0003 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:17.161859+05:30
%A Kanchan Meena
%A Tushar Kanti
%T A Review of Exposure and Avoidance Techniques for Phishing Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 5
%P 27-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is a novel kind of website/network attack which makes a deceitful attempt and influences the amenities or information security instead of stealing personal, financial and transactional data, etc. To preclude users or network from the phishing different techniques has been proposed and implemented. This paper, present the review of literature about the techniques offered by different researchers for exposing and avoiding from the phishing attack also discusses the advantages and limitation of the approaches.

References
  1. Karthikeyan R. G, Sethuraman R, "Phishing Website Detection and Prevention of Phishing Attacks: a Field Experiment", International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 2, February 2014
  2. Gaurav Kumar Tak, Gaurav Ojha, "Multi-Level Parsing Based Approach Against Phishing Attacks With The Help Of Knowledge Bases", International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 6, November 2013
  3. Ammar Almomani, B. B. Gupta, Samer Atawneh, A. Meulenberg, and Eman Almomani, "A Survey of Phishing Email Filtering Techniques", IEEE Communications Surveys & Tutorials, Vol. 15, No. 4, Fourth Quarter 2013
  4. A. Sarannia, U. R. Padma, "Prevention Model for Phishing Attacks In Web Applications Using Linkguard Algorithm", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Special Issue 1, March 2014
  5. Mahmoud Khonji, Youssef Iraqi, Andrew Jones, "Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework", 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates.
  6. Maher Aburrous, M. A. Hossain, Fadi Thabatah, Keshav Dahal, "Intelligent Phishing Website Detection System using Fuzzy Techniques".
  7. Gaurav Kumar Tak, Gaurav Ojha, "Multi-Level Parsing Based Approach Against Phishing Attacks with the Help of Knowledge Bases", IJNSA Vol. 5, No. 6, November 2013
  8. M. Madhuri, K. Yeseswini, U. Vidya Sagar, "Intelligent Phishing Website Detection and Prevention System By Using Link Guard Algorithm", International Journal of Communication Network Security, ISSN: 2231 – 1882, Volume-2, Issue-2, 2013.
  9. M. Topkara, A. Kamra, and M. J. Atallah, et al, "ViWiD: Visible Watermarking Based Defense against Phishing", Lecture Notes in Computer Science, Vol. 3710, 2005, pp. 470-483.
  10. A. Y. Fu, W. Y. Liu, and X. T. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 4, 2006, pp. 301-311.
  11. Arun Vishwanath , Tejaswini Herath , Rui Chen, Jingguo Wang , H. Raghav Rao, "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model", Decision Support Systems 51 (2011) 576–586.
  12. Venkatesh Ramanathan, Harry Wechsler, "Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation", computers & security 3 4 (2 0 1 3 ) 1 2 3 e1 3 9, journal homepage: www. elsevier. com/locate/cose.
  13. Maher Aburrous, M. A. Hossain, Keshav Dahal, Fadi Thabtah, "Intelligent phishing detection system for e-banking using fuzzy data mining", Expert Systems with Applications 37 (2010) 7913–7921.
  14. P. A. Barraclough , M. A. Hossain , M. A. Tahir, G. Sexton , N. Aslam, "Intelligent phishing detection and protection scheme for online transactions", Expert Systems with Applications 40 (2013) 4697–4706.
  15. V. Shreeram, M. Suban, P. Shanthi, K. Manjula, "Anti-Phishing Detection Of Phishing Attacks Using Genetic Algorithm", ICCCCT'10-978-1-4244-7770-8, in proceeding IEEE.
  16. Sadia Afroz, Rachel Greenstadt, "PhishZoo: Detecting Phishing Websites By Looking at Them".
  17. Mallikka Rajalingam, Saleh Ali Alomari, Putra Sumari, "Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages", International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (1) : 2012.
  18. Radha Damodaram, M. L. Valarmathi, "Phishing Website Detection and Optimization Using Particle Swarm Optimization Technique", International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (5): 2011
  19. C. Emilin Shyni and S. Swamynathan, "Protecting the online user's information against phishing attacks using dynamic encryption techniques", Journal of Computer Science, 9 (4): 526-533, 2013, ISSN 1549-3636.
  20. J. Jung and E. Sit "An empirical study of spam traffic and the use of DNS black lists", In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 370-375, New York, NY, USA, 2004. ACM.
  21. F. Schneider, N. Provos, R. Moll, M. Chew, and B. Rakowski, "Phishing protection: Design documentation". https://wiki. mozilla. org/Phishing_Protection:_Design_Documentation.
  22. Clone Phishing - Phishing from Wikipedia, the free encyclopedia, http://en. wikipedia. org/wiki/Phishing
  23. Bimal Parmar, Faronics, "Protecting against spear-phishing",http://www. faronics. com/assets/CFS_2012 01_Jan. pdf
  24. Phone spoofing From Wikipedia, the free encyclopedia http://en. wikipedia. org/wiki/Phishing#Phone_phishing
  25. Namrata Singh, Nihar Ranjan Roy, "A Survey of Phishing Website Detection Technique", IRAJ International Conference-Proceedings of ICRIEST-AICEEMCS, 29th December 2013, Pune India. ISBN: 978-93-82702-50-4
  26. Michael Atighetchi, Partha Pal, "Attribute-based Prevention of Phishing Attacks", 2009 Eighth IEEE International Symposium on Network Computing and Applications.
  27. Shinta Nakayama,Hiroshi Yoshiura, Isao Echizen, "Preventing False Positives in Content-Based Phishing Detection", International Conference on Intelligent Information Hiding and Multimedia Signal Processing in 2009, proceeding in IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Network Phishing Website