2013
DOI: 10.17485/ijst/2013/v6i1.18
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email

Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information. One of the main problems of phishing email detection is the unknown "zero-day" phishing attack, (we define zero-day attacks as attacks that phisher mount using hosts that do not appear in blacklists and not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…Social engineering based phishing attacks are further classified as: spoofed email phishing and fake websites. Furthermore, spoofed email phishing could be spear phishing, if the attack is aimed at a particular person or group of persons or whaling if aimed at a highranking person or employee (Almomani, Gupta and Wan, 2013). Fake websites that have similar visual appearance like a genuine one are equally used to phish a user.…”
Section: Classification Of Phishing Attacksmentioning
confidence: 99%
“…Social engineering based phishing attacks are further classified as: spoofed email phishing and fake websites. Furthermore, spoofed email phishing could be spear phishing, if the attack is aimed at a particular person or group of persons or whaling if aimed at a highranking person or employee (Almomani, Gupta and Wan, 2013). Fake websites that have similar visual appearance like a genuine one are equally used to phish a user.…”
Section: Classification Of Phishing Attacksmentioning
confidence: 99%
“…Several related defensive mechanism can be found in the literature. 39,[43][44][45] In particular, Khonji et al 43 and Almomani et al 44 proposed two defensive mechanisms against user and root access attacks. Another defensive mechanism is proposed by Almomani et al, 45 where the authors presented an email-based filtering method as a defensive mechanism for phishing attacks on both the server side and the client side.…”
Section: Defense Against User and Root Compromise Attacksmentioning
confidence: 99%
“…"Social engineering schemes use spoofed e-mails purporting to be from legitimate businesses and agencies, designed to lead consumers to counterfeit websites that trick recipients into divulging financial data such as usernames and passwords." The phishing based on social engineering is further classified based on [14][15][16][17][18][19]:…”
Section: Taxonomy Of Phishing Attacksmentioning
confidence: 99%