2016 International Conference on Computing, Communication and Automation (ICCCA) 2016
DOI: 10.1109/ccaa.2016.7813778
|View full text |Cite
|
Sign up to set email alerts
|

A literature survey on social engineering attacks: Phishing attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
3

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 111 publications
(41 citation statements)
references
References 8 publications
0
38
0
3
Order By: Relevance
“…Results of the study show that using emoji in social engineering attacks (email, SMS, or text) increases the success rate of social engineering attacks, as using emoji in conversation enhances the victim's trust on the imposter. Similarly in study, 18 Gupta et al, performed a survey on phishing attacks, (which is a type of social engineering attack) so as to develop a counter strategy. Some of the phishing attacks discussed are tab-napping, spoofing emails, Trojan horse, and hacking.…”
Section: F I G U R E 1 Research Protocolmentioning
confidence: 99%
“…Results of the study show that using emoji in social engineering attacks (email, SMS, or text) increases the success rate of social engineering attacks, as using emoji in conversation enhances the victim's trust on the imposter. Similarly in study, 18 Gupta et al, performed a survey on phishing attacks, (which is a type of social engineering attack) so as to develop a counter strategy. Some of the phishing attacks discussed are tab-napping, spoofing emails, Trojan horse, and hacking.…”
Section: F I G U R E 1 Research Protocolmentioning
confidence: 99%
“…To solve these problems, the Link Guard algorithm [29] is used. Phishing email connection characteristics build an algorithm with a set of policies like discovering hyperlinks with the actual link distance [30].…”
Section:  Using Spoofed Email Detectionmentioning
confidence: 99%
“…Typically, the user shares their personal information in their profile and status. In order to prevent this type of attack, the user should be constantly aware of what they post, what they upload, and the user should be particularly aware of the media they share with others when using links [30].…”
Section:  Using Fake Social Networking Accounts Detectionmentioning
confidence: 99%
“…The scope of social engineers starts from message manipulation to disrupt organizational working structure and extends to the exploitation of firms' infrastructure [15]. The scope of physical social engineering attacks encompasses retaining first-hand information from a specific user, whereas, the scope of social-based attacks extends to exploitation of emotional and psychological vulnerabilities of a user [16][17][18][19].…”
Section: Scope Of Social Engineeringmentioning
confidence: 99%
“…Human-based attackers use impersonation, whereas technical attacks are designed to explore online vulnerabilities of the victim. In terms of technical, software-based attacks use various devices including mobile phones and computers to retain information on their targets [15,16,18,19]. Although an attack's first phase of accumulation of information can be through physical methods of gathering intelligence such as shoulder surfing and dumpster dives, this study concentrates only on the online methods of an attack as a part of our new taxonomy.…”
Section: Types Of Attacksmentioning
confidence: 99%