2015 International Conference on Computing and Communications Technologies (ICCCT) 2015
DOI: 10.1109/iccct2.2015.7292734
|View full text |Cite
|
Sign up to set email alerts
|

Phishing - the threat that still exists

Abstract: Phishing is an online security attack in which the hacker aims in harvesting sensitive information like passwords, credit card information etc. from the users by making them to believe what they see is what it is. This threat has been into existence for a decade and there has been continuous developments in counter attacking this threat. However, statistical study reveals how phishing is still a big threat to today's world as the online era booms. In this paper, we look into the art of phishing and have made a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Most phishing detection methods consist of whitelisting and blacklisting and content-based filtering [9]. Shahriar et.…”
Section: Defense Strategymentioning
confidence: 99%
“…Most phishing detection methods consist of whitelisting and blacklisting and content-based filtering [9]. Shahriar et.…”
Section: Defense Strategymentioning
confidence: 99%
“…PhishTank describes phishing as a fraudulent attempt to steal personal information, primarily via email. Phishing is also associated with the theft of personal information related to financial systems, such as passwords for online banking or email passwords [55]. In Spear phishing attack the attacker traps the user by sending him an alluring email.…”
Section: ) Attack On Application Softwarementioning
confidence: 99%
“…In other cases, although the domain name used was brand-new where the domain name was not in any blacklist, retaining the actual HTML content or attempting to submit a form post to the actual target from the fake page resulted in having the website flagged as phishing. 17 Case 1. Content of a genuine web page was duplicated and was hosted on a phishing domain.…”
Section: Analysis Of a State-of-the-art Antiphish Systemmentioning
confidence: 99%