Sie sind auf Seite 1von 8

International Conference on Digital Transformation and Applications (ICDXA) 2020

Phishing Security: Attack, Detection, and Prevention Mechanisms

Wei Heng Lim1, Weng Foong Liew2, Chun Yew Lum3 and Seah Fang Lee4
Faculty of Computing and Information Technology,
Tunku Abdul Rahman University College
Kuala Lumpur, Malaysia
1
limwh-pm17@student.tarc.edu.my
2
liewwf-pm17@student.tarc.edu.my
3
lumcy-pm17@student.tarc.edu.my
4
leeseahfang@tarc.edu.my

ABSTRACT. While the Internet technologies have In traditional phishing, various channels are used
been developed over the decades, a significant issue by criminals to either trick the victim directly by
has been coming along with it, the cybercrime. using a scam or deliver payload indirectly with
Cybercrime consists of various types of cyberattacks the goal to obtain confidential or personal
which could bring mild to serious adverse effects to
information from the victim (Ollmann, 2008). In
individuals or organizations’ operations. Among those
cybercrime attacks, phishing is one of the common a direct mechanism, the criminal may send
mechanisms used. The phishing attack could target on spoofed email messages, mimicking an auction,
any of the electronic communication users. The paper payment sites, online bank, etc. to lead victims to
provides an overview insight on the phishing security a fraudulent designed web page which looks like
concepts, ranging from various types of phishing the login page of the genuine site for getting the
attack techniques, phishing detection mechanism to users’ sensitive information. (Aleroud & Zhou,
prevention approaches. Comparison were included for 2017; Hong, 2012). On the contrary, in an indirect
each of the phishing aspects. manner, a Trojan horse program could be
installed in the victim’s computer to enable the
KEYWORDS: Phishing attack, phishing detection, criminal to use the computer as a message
phishing prevention, phishing security propagator without the victim’s consent
(Ollmann, 2008).
1 INTRODUCTION

Phishing has been bedevilled the Internet world 2 RELATED WORK


for over two decades, beginning from 1995 with
America Online (AOL) (Chiew, Yong, & Tan, Ollmann (2008) stated phishing is not merely
2018). The “phishing” is originated from the term obtaining user account details, but also included
“fishing” where the operation of phishing is stealing personal and financial data. In many
similar to fishing in the following way: the cases, phishers deploy social engineering factors
attacker ‘lures’ the victim by using a “bait” and to mimic the valid authority in sending emails to
“fishes” to obtain personal or confidential victims to surrender their confidential data.
information of the victim (Chiew et al., 2018). Usually the phishing messages are delivered
Phishing is a type of cyberattack in which social through emails and spams. While others use web-
engineering techniques are exploited by the based approach which could be built by the
attacker to perform identity theft (Aleroud & phisher or hosted as embedded content in a third
Zhou, 2017). The attacker who conducts the party web site. Ollmann suggested
phishing attack is commonly known as a countermeasures should be deployed into three
‘phisher’ (Ollmann, 2008). The aim of phishing logical layers, which include from the client-side,
is to collect confidential and sensitive server-side, as well as enterprise. Nonetheless,
information such as usernames, passwords, credit phishing detection mechanisms were not
card numbers and even moneys from the victims discussed in the paper.
(Aleroud & Zhou, 2017). Generally the types of phishing attacks could be
categorized into: spear phishing, clone phishing,
1

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

whaling, phone phishing, Bioazih attack, Dyre In the effort of researching the targeted individual
malware email, heart bleed phishing attack and or company, the attacker may conduct passive
tabnabbing attacks as concluded by Lakhita, reconnaissance by using Open Source
Yadav, Bohra, & Pooja (2016). Intelligence (OSINT) such as browsing the
Shaikh, A. N., Shabut, A. M., & Hossain, M. A. target’s social media profiles, the targeted
(2016) provided a study on the anti-phishing organization’s public website, registration
techniques which includes provide training to information from WHOIS databases, etc. Usually
users on phishing, detect phishing website based this attack requires patient from the attacker in
on layout similarity, detect phishing email with gathering information and have a thorough
the use of hybrid features, detect phishing attack understand on the target. This is to ensure an
by using neural network, neuro-fuzzy logic appropriate spear phishing email that customized
approach, multi-tier phishing and filtering, data based on to the target’s background can be
mining, fuzzy data mining, computer vision generated and increase the success rate of attack.
technique, and anti-phishing tools. 123
Similarly Suryavanshi, N. & Jain A.(2015) 3.2 HTTPS Phishing
discussed on various techniques used for phishing 123
attack detection and prevention, including list HTTPS phishing is a type of phishing attack
based approach, ant colony optimization, phish technique that conform to security measures as a
zoo, K-NearestNeighbor, information flow based legitimate HTTPS connection to trick users to
approaches, attribute based anti-phishing reveal their personal and confidential information
techniques, etc. (Benitez-Mejia, Zacatenco-Santos, Toscano-
Despite there are various discussions on the Medina, & Sánchez-Pérez, 2017). In HTTPS
phishing security, however there is lack of paper phishing, a fake Certificate Authority (CA) has
which presenting an integrative study on the three been created to issue and sign web certificates for
phishing aspects: phishing attack techniques, the counterfeit web server. The intention is to
detection mechanisms and prevention steal the credentials of victims since most of the
approaches. people would think that the data transferred in
Due to page limit, the following sections discuss HTTPS are safe. They tend to trust the web
on common mechanisms used in phishing attack, application shown with a padlock in the web
detection and prevention. browser’s address bar, as this indicates the
123 website is legitimate and has been certified by CA
3 PHISHING ATTACK (Benitez-Mejia, Zacatenco-Santos, Toscano-
TECHNIQUES Medina, & Sánchez-Pérez, 2017; Callegati,
Cerroni, & Ramilli, 2009).
3.1 Spear Phishing In order to conduct a successful HTTPS phishing
123 attack, the attacker has to ensure the design of the
Spear phishing is a type of phishing attack fake website which the victim will be redirected
technique that is customized and targeted at to is looked similar to the legitimate website. This
specific individual, group or an organization is to reduce the suspicion from the target. Similar
instead of spamming thousands of emails technique has been applied to the URL of the fake
randomly for the sake of collecting the website as well. In addition, a fake web server’s
credentials of the users, or other sensitive and IP address could be added into the target’s host
confidential information (Aleroud & Zhou, 2017; file so that the computer is able to resolve the
Bossetta, 2018; Chaudhary, 2014; Chaudhry, URL of the website by directing to the actual IP
Chaudhry, & Rittenhouse, 2016; Chiew et al., address of the fake website (Benitez-Mejia,
2018). Unlike other type of phishing attempts, Zacatenco-Santos, Toscano-Medina, & Sánchez-
efforts to do research and understand a particular Pérez, 2017). For instance, given a sample of IP
organization’s context are required by the spear address: 69.64.176.13. Assume this is the IP
phishers to create effective phishing emails in address of a fake Facebook website. If the IP has
spear phishing (Aleroud & Zhou, 2017). been added into the host file with the domain

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

name of www.facebook.com. Whenever the user embedded with JavaScript in order to begin the
is accessing www.facebook.com, the computer tabnabbing attack. When the victim clicked on
will resolve the URL into 69.64.176.13 instead of the link, the attacker will switch the victim to
the actual IP address of the legitimate Facebook other browser tabs for allowing the embedded
website. When the user entered his or her login JavaScript to load a fake login web page. From
credentials into the fake website, the login there the victim will be trapped in providing login
credential will then be stolen by the attacker. credentials to the attacker. However, tabnabbing
123 only workable if a victim opened multiple
3.3 Man in the Middle (MITM) Attack browser tabs and does not pay attention on the
123 phishing website (Chiew, Yong, & Tan, 2018).
MITM attack is a phishing attack technique in Usually the targeted victims are those busy
which the phisher is positioned in the middle of individuals such as students and employees, as
the victim and the legitimate website to they tend to open multiple browser tabs to
eavesdrop or intercept the messages transferred perform multitasking.
between the victim and the website. This is done 123
by creating SSL connections among the victim 3.5 Comparing Phishing Attack Techniques
attacker, and server (Aleroud & Zhou, 2017; 123
Banu & Banu, 2013; Chiew et al., 2018; Ollmann, Among the phishing attack techniques discussed,
2008). MITM attack can be performed by using man in the middle (MITM) attack is considered
transparent proxy. A transparent proxy is as a dangerous attack. MITM attack could create
different from a traditional one, whereby it is their own certificate by exploiting any HTTPS
placed on the same segment of a network or and SSL-protected website, in which many of the
situated on a route to the real server, allowing all Internet users would trust on (Aleroud & Zhou,
data to be intercepted before routing it to the 2017). Moreover, MITM attack by using
destination server (Chiew et al., 2018; Ollmann, transparent proxies which would force all the
2008). The advantage of using the transparent HTTP and HTTPS traffic to pass through itself,
proxy is that no configuration is needed on the hence creating the chance for the phisher to
client side, thus the client will not be aware of the intercept the transmitted messages (Ollmann,
existence of the proxy, believing that the data is 2008).
directed to its intended destination (Chiew, Yong, However, although the techniques used in the
& Tan, 2018). MITM attack are similar with HTTPS phishing,
123 there is a significant difference between them,
3.4 Tabnabbing Attack The HTTPS involved additional requirement at
123 the client-side configuration, whereby the
Tabnabbing attack is another type of phishing addition or modification on IP address and
attack founded in 2010 by a Mozilla developer domain name in the victim’s computer host file is
called Aza Raskin (Chiew et al., 2018; Lakhita et required. The use of transparent proxies in MITM
al., 2016; Ryck, Nikiforakis, Desmet, & Joosen, does not require any configuration changes in the
2013; Suri, Tomar, & Sahu, 2012). It is also client-side but HTTPS phishing does. Therefore,
known as “tabjacking” or “tabnapping” which the MITM phisher does not need to put in efforts
derived from the words “tab” and “kidnapping” to trick the potential victims into changing the
of a tab in a browser (Suri et al., 2012). The required configuration in their computers, or even
underlying concept of tabnabbing attack is that takes the risk to access physically to their
the phisher hijacks or exploits the browser tab by computers to configure manually, which will be
faking popular sites to convince the victims that time consuming and ineffective if the victim does
the sites are authentic so that they would provide not take the bait.
their login credentials and sensitive information Furthermore, there is another significant
(Suri et al., 2012). difference which distinguish the MITM attack
In tabnabbing attack, the victim will be tricked to from other phishing techniques in terms of danger
click on a URL which directed to a website level, whereby MITM attack is not only able to

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

spy on the transmitted data through the 4.2 Visual Website Similarity
communication channel, but it also allows 123
unauthorized modification on the exchanged data This detection is comparing the visual similarity
without the awareness from the two between legitimate and fake websites. A detector
communication parties (Attackieee et al., 2011). could be created to detect on similar phishing
Whereas for spear phishing, tabnabbing and websites’ screenshots compared to real websites.
HTTPS phishing, phishers can only obtain the In addition, the phishing website signature, its
victims’ credentials by leading the victims to a colour, texture information, etc. could also be
web site under their control. compared. The finding result could then be used
123 to alert users on the possible phishing website and
123 the URL (Lux, 2008).
4 PHISHING DETECTION Visual similarity works well to detect phishing
MECHANISMS websites in general (Lux, 2008). However, the
123 comparison time for both phishing websites and
4.1 Domain Name Based Features legitimate websites may incur a longer time when
123 different image comparison methods are used in
To distinguish domain name based features the website detector. Hence, an optimal images
between legitimate and phishing websites, the comparison method is needed in the website
first criteria to be considered is domain length. detector in order to shorten the images
The domain name chosen by the phishers for comparison time. This requires further evaluation
phishing attack usually would be longer than the and development to achieve better efficiency in
legitimate website (Alexander, 2006). Similarly, terms of comparing the visual similarity between
the URL of a phishing website would usually a legitimate website and a phishing website.
longer than the legitimate website. Meanwhile, 123
HTTPS will also be presented in a phishing 4.3 Sender-Centric Approach
website for the sake of deceiving the users to 123
believe that the website is a trustable and safe site. This approach is mainly used to detect phishing
Shirazi & Ray (2018) commented that the domain emails that targeted on banks. The sender-centric
name placed before or after the copyright logo approach uses the two-step system which
could be an excellent distinguisher towards concerns on separation of banking messages from
phishing detection. This could be done by taking non-banking messages and a set of rules to
50 characters before and after the copyright, identify phishing emails. The Support Vector
including remove the white space. If the resulting Machine (SVM) based classifier is used to
string does not contain the actual domain name, separate real or phishing banking messages apart
suspicion could be raised on the legitimacy of the from non-banking sourced messages. This is
website. done based on the format of message, number of
This phishing detection approach allows normal URLs and keywords of the email (Hsu & Lin,
users to detect the phishing websites manually 2002).
based on the specific characteristics. The After the messages have been separated, three
advantage of the approach is no automated tools rules will be applied to the messages sequentially.
is required in order for a user to detect a phishing Firstly, a message will be checked whether it is
website. Moreover, no technical knowledge or sent by an email account come from Public Email
procedure is required by the users to perform this Service Providers (ESPs) such as Yahoo! Mail,
phishing attack detection approach. Users can Hotmail and Gmail, as most of the phishers will
determine the legitimacy of the websites by use public ESP accounts to send phishing emails.
paying attention to the domain name, URL Then, the sender’s geographical location of the
length, the presence of HTTPS and the domain message will be checked to identify whether the
name with copyright logo of the website. location of the sending machine matched with the
123 location of the bank’s message claimed to be, at
the country level. Lastly, the sending machine
4

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

will be checked whether it is authorized from the the email will be considered as a phishing email.
bank the message claimed to be (Hsu & Lin, Hence organizations could consider to include the
2002). sender-centric mechanism to enhance an
123 organization’s email security level.
4.4 URL-Based Heuristic 123
123 123
The approach detects URL of phishing websites 5 PHISHING PREVENTION
by focusing on the URL features and URL MECHANISMS
ranking since phishing websites could not use the 123
exact URL of the legitimate websites. This 5.1 Anti-phishing Tools
involved the techniques of URL features 123
checking and calculation of heuristic values in A commonly used anti-phishing tool is an anti-
order to determine whether an URL is linked to a phishing toolbar, which usually presented in the
phishing website or a legitimate website. The form of browser’s plug-in extension. An example
algorithm needs an input of URL or hyperlink of anti-phishing toolbar is eBay toolbar. To assist
such as www.abcd.com to perform the checking. a user to differentiate between a legitimate and
On top of checking the URL features based on suspicious web page, the toolbar could
primary domain, sub domain and path domain, automatically keep track of every sites that
the algorithm also considers the ranking of customers visited and show unreadable
domain such as PageRank, AlexaRank and destination message when a user has entered a
AlexaReputation in order to detect phishing suspicious URL. SpoofGuard is another anti-
websites as the ranking of the phishing websites phishing tools which examines the authenticity of
usually are not high (Nguyen, To, Nguyen, & a webpage by calculating the possibility of attack
Nguyen, 2014). rate using an algorithm and would generate a
123 warning message to the user if detected a web
4.5 Comparing Phishing Detection page with high probability of being a spoof
Mechanism (Suryavanshi, Shabut and Hossain, 2017).
123 123
The phishing mechanisms could be compared 5.2 List-Based Approaches
based on two aspects, which are non-technical 123
and technical detection. Firstly, the domain name List-based approaches can be categorized into
based features could be considered as one of the two categories, which are blacklists and
common mechanisms used by online users who whitelists. Both list approaches are the prominent
possess little computing knowledge to detect the list-based approaches used to prevent phishing
phishing attack. The technique does not require attack nowadays. Blacklists consist of a list of
any algorithms in the process of differentiating previously detected phishing URLs, IP addresses
the real and phishing website. Instead users just or keywords that are updated frequently to
required to pay attention on the domain length, prevent online users from accessing those web
URL length, frequency of domain name, HTTPS sites. Whereas the concept of whitelists is
present and domain name with logo to identify contrary to the blacklists. In whitelist approach, a
the legitimacy of a phishing site. list of legitimate sites in which the transaction and
Secondly, in terms of technical detection, Sender- communication are secure is maintained, guiding
Centric approach is considered as one of the users accessing to those legitimate web sites
effective detection mechanisms in detecting the (Abdul, Orunsolu, 2015).
phishing attack. Compared to domain name based 123
features, the Sender-Centric involved more
processes in email verification. An email has to
5.3 User Education
passed through three verification rules in order to 123
confirm whether it is sent from a legitimate site. User education is essential in preventing the
If the email cannot pass through any of the rules, phishing attack. Victims were fell into a phishing
attack mainly due to lacking of knowledge on
5

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

phishing attack. Users are unable to differentiate might make careless mistakes, such as
between legitimate and phishing emails or accidentally accessing to a phishing website
websites. Supports are needed from the (Salahdine and Kaabouch, 2019). Furthermore,
government agencies as well as non-profits most of the phishing websites could be filtered by
organizations to promote education on the using computer-based prevention methods, in
knowledge of phishing attacks. Demonstration which the human might not be able to do so as it
such as the typical phishing attack techniques and is difficult for human to memorize all phishing
sharing of the tips with the users on ways to websites.
prevent from falling in the phishing attack could Anti-phishing tool is one of the accessible
be performed (Huang, Tan and Liu, 2009). phishing prevention mechanisms for online users.
User education is crucial to prevent phishing The tool is able to verify websites without
attack as a typical phishing attack exploits the requires users to possess knowledge in anti-
vulnerabilities, especially the curiosity on human phishing. It verifies the websites by referring to a
by luring the victims with some interesting topics blacklist that listed the phishing URL. Most of the
such as unexpected prize, or a lottery attached phishing URL will be updated in the list and the
with malicious link which will direct the victims quantity of the blacklisted URL is high due to the
to the phishing websites. If the victims are construction of paid experts who identify the
equipped with the knowledge of phishing attack, phishing sites and record the URL into the
this will reduce the chances of falling into the blacklist. Furthermore, anti-phishing tools could
traps set by phishing attacks. be implemented at different levels such as at
123 client-side, server-side or client-server side. In
5.4 Two-Factor Authentication the context of client-side, the anti-phishing tools
123 could be integrated with a web browser such as
Instead of providing only passwords that users Google Chrome and Mozilla Firefox to monitor
should always remember in order to authenticate every activity performed by users and notify the
identities, two-factor authentication requires the users if they are accessing phishing websites. In
users to have the awareness on knowledge factors server-side, phishing email filtering tools could
and possession factors to prove their identity. The be implemented to the server to prevent phishing
knowledge factor is the information that a user attacks (Zeydan, Selamat and Salleh, 2015).
will know such as username and password However, in case if none of the computer-based
whereas the possession factor is an object that the phishing prevention method is available, the
user owns, such as access card, key, one-time- human-based phishing prevention method will
password (OTP) or authentication code. then play an important role to prevent against
For instance, to authenticate an identity, a user is phishing attacks. As various phishing attacks are
required to input the password, and an OTP sent designed based on social engineering factors,
from SMS text message. This would prevent the educating users in phishing prevention will then
user’s account from being attacked as the attacker play an essential role.
who obtained user’s ID and password would fail
to proceed due to further authentication is 123
required. However, the approach is not very 6 CONCLUSION
secure as there is the possibilities a SMS text
message could be intercepted by a cybercriminal Nowadays, phishing attack techniques have been
and forwarded to another phone number (Purkait, evolving and various types of harmful phishing
2012). techniques which exploit based on the
123 vulnerabilities of both computer systems and
5.5 Comparing Phishing Prevention users have been created. Nonetheless, various
Mechanism detection and prevention mechanisms have also
123 been designed to serve as countermeasures. The
In general, computer-based phishing prevention paper provides an overview of study which
approach is better than human-based as human includes phishing attack techniques, detection
and prevention mechanisms. Comparisons were
6

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

included in each of the aspects. Although Benitez-Mejia, D. G. N. et al. (2017) ‘HTTPS: A


software technologies could be used in Phishing Attack in a Network’, Proceedings
preventing phishing attacks, however the effects of the 7th International Conference on
could be increased if users are educated with the Information Communication and
phishing knowledge. Hence it would be essential Management. Moscow, Russian Federation,
if users could be equipped with the knowledge of 28–30 August. pp. 24–27.
phishing attack, detection and prevention Bossetta, M. (2018) ‘The Weaponization of
mechanisms in order to serve as a proactive Social Media: Spear Phishing and
approach in counteract against the phishing Cyberattacks on Democracy’, Journal of
attacks. international affairs, 71(1.5), pp. 97–106.
Callegati, F., Cerroni, W. and Ramilli, M. (2009)
‘Man-in-the-middle Attack to the HTTPS
7 ACKNOWLEDGEMENT Protocol’, IEEE Security and Privacy, 7(1),
pp. 78–81.
The authors would like to thank Tunku Abdul Chaudhary, G. K. (2014) ‘Development Review
Rahman University College for the given on Phishing : A Computer Security Threat’,
supports. International Journal of Advance Research
in Computer Science and Management
Studies, 2(8), pp. 55–64.
REFERENCES Chaudhry, J. A., Chaudhry, S. A. and
Rittenhouse, R. G. (2016) ‘Phishing Attacks
Abdul, Orunsolu. (2015) 'An Updated and Defenses’, International Journal of
Perspective on Phishing Countermeasures Security and its Applications, 10(1), pp. 247–
and Their Effectiveness'. 256.
Aleroud, A. and Zhou, L. (2017) ‘Phishing Chiew, K. L., Yong, K. S. C. and Tan, C. L.
Environments, Techniques, and (2018) ‘A Survey Of Phishing Attacks: Their
Countermeasures: A Survey’, Computers and Types, Vectors and Technical Approaches’,
Security. Elsevier Ltd, 68, pp. 160–196. Expert Systems with Applications, Elsevier
Alexander, T. (2006) ‘Domain Name Registrars: Ltd, 106, pp. 1–20.
Are They Part of the Domain Name Fraud Hong, J. (2012) ‘The State of Phishing Attacks’,
Problem?’ Proceedings of the 3rd Annual Communications of the ACM, 55(1), pp. 74–
Conference on Information Security 81.
Curriculum Development (InfoSecCD 2006). Hsu, C. W., & Lin, C. J. (2002) ‘A Comparison
Kennesaw, Georgia, USA, 22–23 September. of Methods for Multiclass Support Vector
pp. 113–117. Machines’, IEEE Transactions on Neural
Attackieee, D. O. F. M., Salifu, N. B. Y. and Networks, 13(2), pp. 415–425.
Science. (2011) ‘Detection of Man-in-the- Huang, H., Tan, J., & Liu, L. (2009)
middle Attack in IEEE 802.11 Networks’, ‘Countermeasure Techniques for Deceptive
Department Of Electrical and Electronic Phishing Attack’, 2009 International
Engineering, Master Degree thesis, Kwame Conference on New Trends in Information
Nkrumah University Of Science And and Service Science. Beijing, China, 30
Technology, viewed 25 July 2019, June–2 July. pp. 636–641.
<http://ir.knust.edu.gh/bitstream/123456789/ Lakhita et al. (2016) ‘A Review on Recent
509/1/SALIFU%20%20ABDUL- Phishing Attacks in Internet’, Proceedings of
MUMIN.pdf>. the 2015 International Conference on Green
Banu, M. N. and Banu, S. M. (2013) ‘A Computing and Internet of Things (ICGCIoT
Comprehensive Study of Phishing Attacks’, 2015). Noida, India, 8–10 October. IEEE, pp.
International Journal of Computer Science 1312–1315.
and Information Technologies, 4(6), pp. 783– Lux, M. (2008) ‘Using Visual Website Similarity
786. for Phishing Detection and Reporting’, CHI
'12 Extended Abstracts on Human Factors in
7

ICDXA/2020/T3/03 ©ICDXA2020
International Conference on Digital Transformation and Applications (ICDXA) 2020

Computing Systems. Austin, Texas, USA, 5– Zeydan, H. Z., Selamat, A., & Salleh, M. (2015)
10 May. pp. 1625–1630. ‘Survey of Anti-Phishing Tools with
Nguyen, L. A. T., To, B. L., Nguyen, H. K., & Detection Capabilities’, 2014 International
Nguyen, M. H. (2014) ‘A Novel Approach Symposium on Biometrics and Security
for Phishing Detection Using URL-Based Technologies (ISBAST). Kuala Lumpur,
Heuristic’, 2014 International Conference on Malaysia, 26–27 August. pp. 214–219.
Computing, Management and
Telecommunications (ComManTel 2014). Da
Nang, Vietnam, 27–29 April. pp. 298–303.
Ollmann, G. (2008) ‘The Phishing Guide:
Understanding and Prevent Phishing
Attacks’, Security, pp. 1–42.
Purkait, S. (2012) ‘Phishing counter measures
and their effectiveness - literature review’,
Information Management & Computer
Security, 20(5), pp. 382 – 420.
Ryck, P. De et al. (2013) ‘TabShots : Client-Side
Detection of Tabnabbing Attacks’,
Proceedings of the 8th ACM SIGSAC
symposium on Information, computer and
communications security. Hangzhou, China,
8–10 May. pp. 447–455, doi:
10.1145/2484313.2484371.
Salahdine, F., & Kaabouch, N. (2019) ‘Social
Engineering Attacks: A Survey’, Future
Internet, pp. 1–42.
Shaikh, A. N., Shabut, A. M., & Hossain, M. A.
(2016) ‘A Literature Review on Phishing
Crime, Prevention Review and Investigation
of Gaps’, 2016 10th International
Conference on Software, Knowledge,
Information Management & Applications
(SKIMA). Chengdu, China, 15–17 December.
pp. 9–15.
Shirazi, H., Bezawada, B., & Ray, I. (2018)
‘"Kn0w Thy Doma1n Name": Unbiased
Phishing Detection Using Domain Name
Based Features’, Proceedings of the 23nd
ACM on Symposium on Access Control
Models and Technologies. Indianapolis,
Indiana, USA, 13–15 June. pp. 69–75.
Suryavanshi, N., Pradesh, M., Jain, A., &
Pradesh, M. (2015) ‘A Review of Various
Techniques forDetection and Prevention for
Phishing Attack’, International Journal of
Advanced Computer Technology (IJACT).
pp. 143–147
Suri, R. K., Tomar, D. S. and Sahu, D. R. (2012)
‘An Approach to Perceive Tabnabbing
Attack’, International Journal Of Scientific
& Technology Research, 1(6), pp. 90–94.
8

ICDXA/2020/T3/03 ©ICDXA2020

Das könnte Ihnen auch gefallen