A Survey Paper of Study about Phishing and Anti-Phishing Techniques
DOI:
https://doi.org/10.53555/cse.v2i4.192Keywords:
Phishing attacks, Phishing process,, hishing attack stage,anti-phishing technologies, identity theft,, Report phishing,Abstract
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate and even the Web pages where users are asked to enter their information may look real. Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal personal information. This paper gives brief information about phishing, its attacks, steps that users can take to safeguard their confidential information. This paper also shows a survey conducted by netcraft on phishing.
Downloads
References
Angelo P.E. Rosiello, Engin Kirda Christopher kruegel and Fabrizio Ferrandi.”A Layout Similarity Based approach For Detecting Phishing Pages”. IEEE Conference on Security and Privacy in Communication Networks, Nice, France, September 2007.
Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh, and John Mitchell.”Client-side defense against webbased identity theft”.In 11th Annual Network and Distributed System Security Symposium(NDSS’04), San Diego, 2005.
[APWG] The Anti-phishing Working Group, “Proposed Solutions to Address the Threat of E-mail Spoofing Scams,” December 2003.
[APJU] The Anti-Phishing Working Group, “Phishing Attacks Trend Report, June 2004”.
Microsoft Security Bulletin MS05-001, January 11, 2005. http://www.microsoft.com/technet/security/bulletin/MS05-001.mspx
Anti-Phishing Working Group, http://www.antiphishing.org.
“Man sentenced for "botnet" attack on hospital,” The Mercury News, August 25, 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in