CFP last date
22 April 2024
Reseach Article

Study on Phishing Attacks

by Vaishnavi Bhavsar, Aditya Kadlak, Shabnam Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 33
Year of Publication: 2018
Authors: Vaishnavi Bhavsar, Aditya Kadlak, Shabnam Sharma
10.5120/ijca2018918286

Vaishnavi Bhavsar, Aditya Kadlak, Shabnam Sharma . Study on Phishing Attacks. International Journal of Computer Applications. 182, 33 ( Dec 2018), 27-29. DOI=10.5120/ijca2018918286

@article{ 10.5120/ijca2018918286,
author = { Vaishnavi Bhavsar, Aditya Kadlak, Shabnam Sharma },
title = { Study on Phishing Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 182 },
number = { 33 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 27-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number33/30244-2018918286/ },
doi = { 10.5120/ijca2018918286 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:11.732183+05:30
%A Vaishnavi Bhavsar
%A Aditya Kadlak
%A Shabnam Sharma
%T Study on Phishing Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 33
%P 27-29
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day there is a lot of data security issues. Hackers are now very much expert in using their knowledge for hack into someone else’s system and grab the information. Phishing is one such type of methodologies which are used to acquire the information. Phishing is a cyber crime in which emails, telephone, text messages, personally identifiable information, banking details, credit card details, password is been targeted. Phishing is mainly a form of online identify theft. Social Engineering is being used by the phisher to steal victim’s personal data and the account details. This research paper gives a fair idea of phishing attack, the types of phishing attack through which the attacks are performed, detection and prevention towards it.

References
  1. Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654.
  2. Huang, H., Zhong, S., & Tan, J. (2009, August). Browser-side countermeasures for deceptive phishing attack. In 2009 Fifth International Conference on Information Assurance and Security (pp. 352-355). IEEE.
  3. Ali, M. M., Siddiqui, O. A., Nayeemuddin, M., & Rajamani, L. (2015, January). An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology. In Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on (pp. 1-6). IEEE.
  4. Raffetseder, T., Kirda, E., & Kruegel, C. (2007, May). Building anti-phishing browser plug-ins: An experience report. In Proceedings of the Third International Workshop on Software Engineering for Secure Systems (p. 6). IEEE Computer Society.
  5. Yadav, S., & Bohra, B. (2015, October). A review on recent phishing attacks in Internet. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 1312-1315). IEEE.
  6. Chen, J., & Guo, C. (2006, October). Online detection and prevention of phishing attacks. In Communications and Networking in China, 2006. ChinaCom'06. First International Conference on (pp. 1-7). IEEE.
  7. Zave, P. (1995, March). Classification of research efforts in requirements engineering. In Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95) (pp. 214-216). IEEE.
  8. Wang, J., Herath, T., Chen, R., Vishwanath, A., & Rao, H. R. (2012). Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email. IEEE transactions on professional communication, 55(4), 345-362.
  9. Zhang, H., Liu, G., Chow, T. W., & Liu, W. (2011). Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Transactions on Neural Networks, 22(10), 1532-1546.
  10. Jakobsson, M., Tsow, A., Shah, A., Blevis, E., & Lim, Y. K. (2007, February). What instills trust? a qualitative study of phishing. In International Conference on Financial Cryptography and Data Security (pp. 356-361). Springer, Berlin, Heidelberg.
  11. https;//goo.gl/images/rGh3J8.
Index Terms

Computer Science
Information Sciences

Keywords

Social Engineering Phishing Cyber Crime.