Phishing Detection: A Literature Survey

作者: Andrew Jones Mahmoud Khonji , Youssef Iraqi , None

DOI: 10.1109/SURV.2013.032213.00009

关键词:

摘要: This article surveys the literature on detection of phishing attacks. Phishing attacks target vulnerabilities that exist in systems due to human factor. Many cyber are spread via mechanisms exploit weaknesses found end-users, which makes users weakest element security chain. The problem is broad and no single silver-bullet solution exists mitigate all effectively, thus multiple techniques often implemented specific paper aims at surveying many recently proposed mitigation techniques. A high-level overview various categories also presented, such as: detection, offensive defense, correction, prevention, we belief critical present where fit overall process.

参考文章(42)
Felix C. Freiling, Konrad Rieck, Christian Gorecki, Thorsten Holz, Measuring and Detecting Fast-Flux Service Networks network and distributed system security symposium. ,(2008)
John C. Mitchell, Neil Chou, Yuka Teraguchi, Robert Ledesma, Client-Side Defense Against Web-Based Identity Theft. network and distributed system security symposium. ,(2004)
Lorrie Faith Cranor, Jason I. Hong, Serge Egelman, Yue Zhang, Phinding Phish: An Evaluation of Anti-Phishing Toolbars network and distributed system security symposium. ,(2006)
Debra L. Cook, Vijay K. Gurbani, Michael Daniluk, Phishwish: A Stateless Phishing Filter Using Minimal Rules financial cryptography. pp. 182- 186 ,(2008) , 10.1007/978-3-540-85230-8_15
André Bergholz, Jan De Beer, Sebastian Glahn, Marie-Francine Moens, Gerhard Paaß, Siehyun Strobel, New filtering approaches for phishing email Journal of Computer Security. ,vol. 18, pp. 7- 35 ,(2010) , 10.3233/JCS-2010-0371
P. Likarish, E. Jung, D. Dunbar, T. E. Hansen, J. P. Hourcade, B-APT: Bayesian Anti-Phishing Toolbar international conference on communications. pp. 1745- 1749 ,(2008) , 10.1109/ICC.2008.335
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, Elizabeth Nunge, Protecting people from phishing: the design and evaluation of an embedded training email system human factors in computing systems. pp. 905- 914 ,(2007) , 10.1145/1240624.1240760
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, Minaxi Gupta, PhishNet: Predictive Blacklisting to Detect Phishing Attacks international conference on computer communications. pp. 346- 350 ,(2010) , 10.1109/INFCOM.2010.5462216
Thomas A. Phelps, Robert Wilensky, Robust Hyperlinks and Locations D-lib Magazine. ,vol. 6, ,(2000) , 10.1045/JULY2000-WILENSKY