520
Views
23
CrossRef citations to date
0
Altmetric
Articles

Recent survey of various defense mechanisms against phishing attacks

, &

References

  • Abbasi, A., Zahedi, F. M., Zeng, D., Chen, Y., Chen, H., & Nunamaker, J. F. Jr. (2015). Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31(4), 109–157.
  • Abraham, D., & Raj, N. S. (2014, September). Approximate string matching algorithm for phishing detection. In Proceeding of International Conference on Advances in Computing, Communications and Informatics (ICACCI) New Delhi, India: IEEE, 2285–2290.
  • Alomari, E., Manickam, S., Gupta, B. B., Singh, P., Anbar, M. ( 2014). Design, deployment and use of HTTP–based botnet (HBB) testbed. In Proceedings of 16th International conference on Advance Communication Technology (ICACT–2014), 250 Phoenix Park, PyeongChang, South Korea, February 16–19, 2014.
  • Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., and Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials, 15(4), 2070–2090.
  • Almomani, A., Gupta, B. B., Wan, T. C., Altaher, A., & Manickam, S. (2013). Phishing dynamic evolving neural fuzzy framework for online detection “zero–day” phishing email. Indian Journal of Science and Technology, 6(1), 3960–3964,
  • Anti-Phishing Working Group (APWG). (2012). Phishing activity trends report—fourth quarter 2012. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_Q4_2012.pdf
  • Anti-Phishing Working Group (APWG). (2013). Phishing activity trends report—first quarter 2013. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q1_2013.pdf
  • Beidermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data centric phishing detection based on transparent virtualization technologies. In Proceedings of the 12th Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada: IEEE, 215–223.
  • Chung, E. H., Chiew, K. L. Sze, S. N., & Tiong, W. K. (2013, December). Phishing detection via identification of website identity. In Proceedings of IT Convergence and Security (ICITCS) International Conference. Macao,PRC: IEEE, 1–10.
  • Debarr, D. (2013). Spam, phishing and fraud detection using random projection, adversial learning and semi-supervised learning [Doctoral Dissertation]. Fairfax, VA: George Mason University.
  • Geng, G., Lee, X., & Tseng, S. (2013, September). Favicon—A clue to phishing detection sites. In Proceeding of the eCrime Researchers Summit. IEEE,San Francisco, CA: IEEE, 1–10.
  • Gupta, B. B. Gupta, S., Gangwar, S., Kumar, M., Meena, P.K. (2015). Cross-site scripting (XSS) abuse and defense: Exploitation on several testing bed environments and its defense. Journal of Information Privacy and Security, 11(2), 118–126.
  • Gupta, S., & Kumarguru, P. (2014, September). Emerging phishing trends and effectiveness of the anti-phishing landing page. In Proceedings of the APWG Symposium on eCrime Summit. Birmingham, AL: Anti-Phishing Working Group (APWG), 36–47.
  • Husak, M., & Cegan, J. (2014, September). PhiGARo: Automatic phishing detection and incident response framework. In Proceedings of 9th International Conference on Availability, Reliability and Security, Fribourg, Germany: IEEE, 295–302.
  • Lee, L. H., Lee, K. C., Chen, H. H., & Tseng, Y. H. (2014, November). POSTER: Proactive blacklist update for anti-phishing. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 1448–1450). New York, NY: AMC.
  • Lininger, R., & Vines, R.D. (2005). Phishing: Cutting the identity theft line. Indianapolis, IN: Wiley Publishing.
  • Mejias, R. J., & Balthazard, P. A. (2014). A model of information security awareness for assessing information security risk for emerging technologies. Journal of Information Privacy and Security, 10(4), 160–185.
  • Mishra, A., & Gupta, B. B. (2014, August). Hybrid solution to detect and filter zero-day phishing attacks. In Proceedings of the Second International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, Bangalore, India, 373–379.
  • Pandey, M., & Ravi, V. (2013, December). Phishing detection using PSOAANN based one-class classifier. In Proceedings of 6th International Conference on Emerging Trends in Engineering and Technology. Nagpur,India: IEEE, 148–153.
  • Park, G. Stuart, L.M., Taylor, J.M., & Raskin, V. (2014, October). Comparing machine and human ability to detect phishing emails. In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics. San Diego, CA: IEEE, 2322–2327.
  • Ramanthan, V., & Wechsler, H. (2013). Phishing detection and impersonated entity discovery using conditional random field and latent dirichlet allocation. Computers & Security, 34, 123–139
  • Sodiya, A. S., Folorunso, O., Komolafe, P. B., & Ogunderu, O. P. (2011) Preventing authentication systems from keylogging attack. Journal of Information Privacy and Security, 7(2), 3–27.
  • Statista: The Statistics Portal. (2014). Statistics and market data on cyber crime. Retrieved from http://www.statista.com/markets/424/topic/1065/cyber-crime/
  • Tripathi, S., Gupta, B. B., Almomani, A., Mishra, A., & Veluru, S. (2013). Hadoop-based defence solution to handle distributed denial of service (DDoS) attacks. Journal of Information Security (JIS), Scientific Research, 4(3), 150–164.
  • Wu, L., Du, X., & Wu, J. (2014, August). MobiFish: A lightweight anti-phishing scheme for mobile phones. In Proceedings of the 23rd International Conference Computer Communication and Networks (ICCCN). Shanghai, China: IEEE, 1–8.
  • Yu, W. D., Nargundkar, S., and Tiruthani, N. (2008, July). A phishing vulnerability analysis of web based systems. In Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008). Marrakech,Morocco: IEEE, 326–331.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.