![]() |
10.5120/ijca2017913461 |
Tenzin Dakpa and Peter Augustine. Study of Phishing Attacks and Preventions. International Journal of Computer Applications 163(2):5-8, April 2017. BibTeX
@article{10.5120/ijca2017913461, author = {Tenzin Dakpa and Peter Augustine}, title = {Study of Phishing Attacks and Preventions}, journal = {International Journal of Computer Applications}, issue_date = {April 2017}, volume = {163}, number = {2}, month = {Apr}, year = {2017}, issn = {0975-8887}, pages = {5-8}, numpages = {4}, url = {http://www.ijcaonline.org/archives/volume163/number2/27365-2017913461}, doi = {10.5120/ijca2017913461}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
The Internet is a great discovery for ordinary citizens correspondence. People with criminal personality have found a method for taking individual data without really meeting them and with minimal danger of being gotten. It is called Phishing. Phishing represents a huge threat to the web based business industry. Not just does it smash the certainty of clients towards online business, additionally causes electronic administration suppliers colossal financial misfortune. Subsequently, it is fundamental to think about phishing. This paper gives mindfulness about Phishing assaults and hostile to phishing apparatuses.
References
- S.Arun, D.Ananda, T.Selvaprabhu, B.Sivakumar, P.Revathi, and H.Shine, “Detecting Phishing Attacks In Purchasing Process Through Proactive Approach,” Adv. Comput. an Int. J., vol. 3, no. 3, pp. 81–93, 2012.
- Q. Ma, “The process and characteristics of phishing attacks - A small international trading company case study,” J. Technol. Res., vol. 4, pp. 1–16, 2013.
- A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, “A survey of phishing email filtering techniques,” IEEE Commun. Surv. Tutorials, vol. 15, no. 4, pp. 2070–2090, 2013.
- E. Kirda and C. Kruegel, “Protecting Users Against Phishing Attacks with AntiPhish.”
- G. M. J, M. M. Mohideen, and S. B. N, “E-Mail Phishing - An open threat to everyone,” vol. 4, no. 2, pp. 2–5, 2014.
- M. N. Banu, M. A. M. C. Engineering, J. Mohamed, and C. Autonomous, “A Comprehensive Study of Phishing Attacks,” vol. 4, no. 6, pp. 783–786, 2013.
- U. Odaro and B. G. Sanders, “Social Engineering : Phishing for a Solution Research methodology,” pp. 88–96, 2007.
- R. Damodaram, “Study on phishing attacks and antiphishing tools,” pp. 700–705, 2016.
- M. Chawla, “A Survey of Phishing Attack Techniques,” vol. 93, no. 3, pp. 1–4, 2014.
- V. Antony and D. James, “A Survey of Online Detection and Prevention of Phishing Attacks,” vol. 4, no. 8, pp. 4–6, 2013.
- T. M. Incorporated, “Spear-Phishing Email : Most Favored APT Attack Bait,” 2012.
- J. Chhikara and M. Rani, “International Journal of Advanced Research in Phishing & Anti-Phishing Techniques : Case Study Phishing attacks Exploit Based,” vol. 3, no. 5, pp. 458–465, 2013.
- M. Security, “Agenda – Phishing Intro.”
- R. Gonzalez and M. E. Locasto, “An interdiscplinary study of phishing and spear-phishing attacks .,” pp. 1–3.
- V. Suganya, “A Review on Phishing Attacks and Various Anti Phishing Techniques,” vol. 139, no. 1, pp. 20–23, 2016.
- I. J. C. Network, R. Gupta, and P. K. Shukla, “Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System,” no. November, pp. 70–77, 2015.
- C. Science and M. Studies, “Development Review on Phishing : A Computer Security Threat,” pp. 55–64, 2014.
- ]“journal8.pdf.crdownload.”
- K. R. Sahu, “A Survey on Phishing Attacks,” vol. 88, no. 10, pp. 42–45, 2014.
- N. Suryavanshi, M. Pradesh, A. Jain, and M. Pradesh, “A Review of Various Techniques for Detection and Prevention for Phishing Attack,” pp. 41–46.
Keywords
Phishing, Phishing Types, Prevention of Phishing, Anti-phishing tool.