2014
DOI: 10.5120/16197-5460
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Phishing Attack Techniques

Abstract: Now in a day's phishing is a special type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, transaction or password data to what they think is their service provider's website. Phishing has two techniques, deceptive phishing and malware -based phishing. Here we focus on deceptive phishing using social engineering schemes. To protect users against phishing, various anti-phishing techniques have been proposed. In this paper we have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The deception is more related to the SE method, which relies on mimic emails and websites that emerge to originate from a legitimate institute. However, the malware method is phishing-based, which depends on malicious code or malware [24]. Cyber attackers would try to gain the trust of users, and via human behaviors, they will attempt to manipulate individuals or organizations.…”
Section: B the Most Common Seamentioning
confidence: 99%
“…The deception is more related to the SE method, which relies on mimic emails and websites that emerge to originate from a legitimate institute. However, the malware method is phishing-based, which depends on malicious code or malware [24]. Cyber attackers would try to gain the trust of users, and via human behaviors, they will attempt to manipulate individuals or organizations.…”
Section: B the Most Common Seamentioning
confidence: 99%
“…Other than online platforms, emails are also prone to be targeted by scammers to deceive people through an attack known as phishing. There are two types of phishing: deceiving people in order to collect personal information and spreading malwares [119]. In phishing attacks, victims will receive an email with texts that influence them to click on a link.…”
Section: ) Deception Detectionmentioning
confidence: 99%
“…A brief survey on different techniques is given by Minal Chawla and Siddarth Singh Chouhan [8]. They have discussed the various practices and procedures through which an attacker can send the phishing page URL to the user.…”
Section: Related Workmentioning
confidence: 99%