2020
DOI: 10.1109/comst.2019.2957750
|View full text |Cite
|
Sign up to set email alerts
|

SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective

Abstract: Phishing and spear phishing are typical examples of masquerade attacks since trust is built up through impersonation for the attack to succeed. Given the prevalence of these attacks, considerable research has been conducted on these problems along multiple dimensions. We reexamine the existing research on phishing and spear phishing from the perspective of the unique needs of the security domain, which we call security challenges: real-time detection, active attacker, dataset quality and baserate fallacy. We e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
74
0
6

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 87 publications
(80 citation statements)
references
References 234 publications
(794 reference statements)
0
74
0
6
Order By: Relevance
“…This work considers four supervised machine learning algorithms, which have extensively been used for phishing detection [12], namely: Multilayer Perceptron, Support Vector Machine, Naïve Bayes, and Decision Trees.…”
Section: Detection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…This work considers four supervised machine learning algorithms, which have extensively been used for phishing detection [12], namely: Multilayer Perceptron, Support Vector Machine, Naïve Bayes, and Decision Trees.…”
Section: Detection Methodsmentioning
confidence: 99%
“…As a result, if one needs to keep up with phishing campaigns, then it is important to use data-driven approaches instead of solely relying on static knowledge provided by blacklists. Supervised machine learning methods, particularly those applied for URL classification [12] 15have been successful in the past in determining if the class of URL is malicious or benign.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Internet browsers, email systems and other socio-technical systems require input from individual users. Such systems may be designed in a way that aims to protect users and organizations from external attackers as much as is possible (Das et al, 2020). How successful they are in doing so is highly reliant on the user (Pfeffel et al, 2019).…”
Section: Introductionmentioning
confidence: 99%