Open Access   Article Go Back

Detailed Survey on Phishing and Anti-Phishing Techniques

Anirban Bhowmick1

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-2 , Page no. 56-62, Feb-2015

Online published on Feb 28, 2015

Copyright © Anirban Bhowmick . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anirban Bhowmick, “Detailed Survey on Phishing and Anti-Phishing Techniques,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.56-62, 2015.

MLA Style Citation: Anirban Bhowmick "Detailed Survey on Phishing and Anti-Phishing Techniques." International Journal of Computer Sciences and Engineering 3.2 (2015): 56-62.

APA Style Citation: Anirban Bhowmick, (2015). Detailed Survey on Phishing and Anti-Phishing Techniques. International Journal of Computer Sciences and Engineering, 3(2), 56-62.

BibTex Style Citation:
@article{Bhowmick_2015,
author = {Anirban Bhowmick},
title = {Detailed Survey on Phishing and Anti-Phishing Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2015},
volume = {3},
Issue = {2},
month = {2},
year = {2015},
issn = {2347-2693},
pages = {56-62},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=403},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=403
TI - Detailed Survey on Phishing and Anti-Phishing Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Anirban Bhowmick
PY - 2015
DA - 2015/02/28
PB - IJCSE, Indore, INDIA
SP - 56-62
IS - 2
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
3037 2392 downloads 2416 downloads
  
  
           

Abstract

Internet has been a pathway for cybercrimes. The facility internet has delivered is vast but at the same time data privacy of individuals has been risked. Phishing is an example of social engineering techniques used to deceive users. In this paper, the authors made an attempt to enlighten readers with the different aspects of phishing. Public awareness is essential to combat such crimes. Different types of phishing techniques, their avoidance and detection has been presented in this paper. Further, a section highlights numerous research works on anti-phishing techniques. The later part of the paper illustrates the phishing scams and statistics for greater understandability of the problem. The readers are also informed about the various anti-phishing groups and where to report any sort of suspicious phishing activity.

Key-Words / Index Term

Phishing, Internet based security, Anti-Phishing

References

[1] Vignesh.M, Gokul Ram.T, Akhil.R, Rajesh Kumar N.S.R, Karthikeyan.R, “Analysis of Phishing in Networks”, International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 196 ISSN 2229-5518
[2] Aanchal Malhotra, Navdeep Kaur, “Browser Prevention Against Phishing Website Security Risk”, IJCSC, Vol. 3, No. 1, January-June 2012, pp. 215-219
[3] Kanchan Meena, Tushar Kanti, “A Review of Exposure and Avoidance Techniques for Phishing Attack”, International Journal of Computer Applications (0975 – 8887) Volume 107 – No 5, December 2014.
[4] Ahmad Alamgir Khan, “Preventing Phishing Attacks using One Time Password and User Machine Identification”, International Journal of Computer Applications (0975 – 8887) Volume 68– No.3, April 2013.
[5] P. K. Sengar, Vijay Kumar, “Client-Side Defense against Phishing with PageSafe”, International Journal of Computer Applications (0975 – 8887) Volume 4 – No.4, July 2010.
[6] Mahmoud Khonji, Youssef Iraqi, Andrew Jones, “Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework”, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates.
[7] Gaurav Kumar Tak, Gaurav Ojha, “Multi-Level Parsing Based Approach Against Phishing Attacks with the Help of Knowledge Bases”, IJNSA Vol.5, No.6, November 2013.
[8] Sadia Afroz, Rachel Greenstadt, “PhishZoo: Detecting Phishing Websites By Looking at Them”
[9] T.Balamuralikrishna, N.raghavendrasai, M.Satya Sukumar “Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
[10] A.V.R.Mayuri “Phishing Detection based on Visual-Similarity” International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
[11] Mallikka Rajalingam, Saleh Ali Alomari, Putra Sumari, “Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages”, International Journal of Computer Science and Security (IJCSS), Volume (6): 2012.
[12] Shivender Singh, Anil K. Sarje, Manoj Misra, “Client-Side Counter Phishing Application using Adaptive Neuro-Fuzzy Inference System”, 978-0-7695-4850-012 2012 IEEE.
[13] Michael Atighetchi, Partha Pal, “Attribute-based Prevention of Phishing Attacks”, 978-1-4673-2104-412 2012 IEEE.
[14] M. Usha, P. Deepika, “Phishing - A Challenge in the Internet”, International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 260-26.
[15] An article on “Phishing Activity Trends Report 1st Quarter 2014” available at: docs.apwg.org/reports/apwg_trends_report_q1_2014.pdf.