Phishing Attacks and Countermeasures

作者: Zulfikar Ramzan

DOI: 10.1007/978-3-642-04117-4_23

关键词:

摘要: This chapter surveys phishing attacks and their countermeasures. We first examine the underlying ecosystem that facilitates these attacks. Then we go into some detail with regard to techniques phishers use, kind of brands they target, as well variations on traditional Finally, describe several proposed countermeasures relative merits.

参考文章(10)
Zulfikar Ramzan, Candid Wueest, Phishing Attacks: Analyzing Trends in 2006. conference on email and anti-spam. ,(2007)
Markus Jakobsson, Zulfikar Ramzan, Crimeware: Understanding New Attacks and Defenses ,(2008)
D. A. Osvik, D. Molnar, A. Sotirov, J. Appelbaum, Arjen K. Lenstra, M. Stevens, B. de Weger, MD5 considered harmful today, creating a rogue CA certificate 25th annual Chaos Communication Congress. ,(2008)
A. Juels, M. Jakobsson, T.N. Jagatic, Cache cookies for browser authentication ieee symposium on security and privacy. pp. 301- 305 ,(2006) , 10.1109/SP.2006.8
Min Wu, Robert C. Miller, Simson L. Garfinkel, Do security toolbars actually prevent phishing attacks human factors in computing systems. pp. 601- 610 ,(2006) , 10.1145/1124772.1124863
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer, The Emperor's New Security Indicators ieee symposium on security and privacy. pp. 51- 65 ,(2007) , 10.1109/SP.2007.35
Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer, Social phishing Communications of the ACM. ,vol. 50, pp. 94- 100 ,(2007) , 10.1145/1290958.1290968
Lance James, Phishing Exposed ,(2005)