A Survey Paper of Study about Phishing and Anti-Phishing Techniques
DOI:
https://doi.org/10.53555/cse.v2i4.192Keywords:
Phishing attacks, Phishing process,, hishing attack stage,anti-phishing technologies, identity theft,, Report phishing,Abstract
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate and even the Web pages where users are asked to enter their information may look real. Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal personal information. This paper gives brief information about phishing, its attacks, steps that users can take to safeguard their confidential information. This paper also shows a survey conducted by netcraft on phishing.
Downloads
References
Angelo P.E. Rosiello, Engin Kirda Christopher kruegel and Fabrizio Ferrandi.”A Layout Similarity Based approach For Detecting Phishing Pages”. IEEE Conference on Security and Privacy in Communication Networks, Nice, France, September 2007.
Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh, and John Mitchell.”Client-side defense against webbased identity theft”.In 11th Annual Network and Distributed System Security Symposium(NDSS’04), San Diego, 2005.
[APWG] The Anti-phishing Working Group, “Proposed Solutions to Address the Threat of E-mail Spoofing Scams,” December 2003.
[APJU] The Anti-Phishing Working Group, “Phishing Attacks Trend Report, June 2004”.
Microsoft Security Bulletin MS05-001, January 11, 2005. http://www.microsoft.com/technet/security/bulletin/MS05-001.mspx
Anti-Phishing Working Group, http://www.antiphishing.org.
“Man sentenced for "botnet" attack on hospital,” The Mercury News, August 25, 2006.

