6 Conclusion
Attacks using phishing are still one of the biggest risks to people and businesses today. This is mostly driven by human engagement in the phishing cycle, as was mentioned in the article. Phishers often prey on human weaknesses in addition to promoting favorable technology settings (i.e., technical vulnerabilities). Age, gender, internet addiction, user stress, and many other characteristics have been found to affect a person’s vulnerability to phishing. Along with more established phishing channels (like email and the web), newer phishing mediums like phone and SMS phishing are becoming more popular. Along with the expansion of social media, phishing on social media has also become increasingly prevalent. Concurrently, phishing has evolved beyond financial crimes and collecting sensitive information to include cyberterrorism, hacktivism,
REFERENCES
  1. Steinhoff, U., A. Wiesmaier, and R. Araújo. ”The state of the art in DNS spoofing.” Proc. 4th Intl. Conf. Applied Cryptography and Network Security (ACNS). 2006.
  2. Ramzan, Zulfikar, and Candid Wüest. ”Phishing Attacks: Analyzing Trends in 2006.” CEAS. 2007.
  3. Felten, Edward W., et al. ”Web spoofing: An internet con game.”
Software World 28.2 (1997): 6-8
  1. Choi, Kwan, Ju-lak Lee, and Yong-tae Chun. ”Voice phishing fraud and its modus operandi.” Security Journal 30.2 (2017): 454-466.
  2. Bhavsar, Vaishnavi, Aditya Kadlak, and Shabnam Sharma. ”Study on phishing attacks.” Int. J. Comput. Appl 182 (2018): 27-29
  3. Banu, M. Nazreen, and S. Munawara Banu. ”A comprehensive study of phishing attacks.” International Journal of Computer Science and Information Technologies 4.6 (2013): 783-786
  4. Yadav, Surendra, and Brahmdutt Bohra. ”A review on recent phishing attacks on the Internet.” 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 201
  5. Peltier, Thomas R. ”Social engineering: Concepts and solutions. “Information Security Journal 15.5 (2006):
  6. Chiang Yung-chen. Social engineering and the social sciences in China, 1919-1949. Cambridge University Press, 2001
  7. Krombholz, Katharina, et al. ”Advanced social engineering attacks.” Journal of Information Security and applications 22 (2015): 113-122
  8. Vijayalakshmi, M., et al. ”Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions.” Iet Networks 9.5 (2020): 235-246.
  9. Ankit Kumar, and Brij B. Gupta. ”Phishing detection: analysis of visual similarity-based approaches.” Security and Communication Networks 2017 (2017)
  10. Chiew, Kang Leng, et al. ”A new hybrid ensemble feature selection framework for machine learning-based phishing detection system.” Information Sciences 484 (2019): 153-16
  11. Moghimi, Mahmood, and Ali Yazdani Varjani. ”New rule-based phishing detection method.” Expert systems with applications 53 (2016): 231 -242.
  12. Qabajeh, Issa, Fadi Thabtah, and Francisco Chiclana. ”A recent review of conventional vs. automated cybersecurity anti-phishing techniques.” Computer Science Review 29 (2018): 44-55.
  13. A. Desai, J. Jatakia, R. Naik, and N. Raul, “Malicious web content detection using machine leaning,” RTEICT 2017 - 2nd IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol. Proc., vol. 2018–Janua, pp. 1432–1436, 2018.
  14. S. Parekh, D. Parikh, S. Kotak, and P. S. Sankhe, “A New Method for Detection of Phishing Websites: URL Detection,” in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, vol. 0, no. Icicct, pp. 949–952
  15. X. Zhang, Y. Zeng, X. Jin, Z. Yan, and G. Geng, “Boosting the Phishing Detection Performance by Semantic Analysis,” 2017.
  16. J. Ma, L.K. Saul, S. Savage, G.M. Voelker, beyond block lists: Learning to detect malicious web sites from suspicious URLs, In: Proc.15th ACM SIGKDD Int.Conf. Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 1245-1254.
  17. S.C. Jeeva, E.B. Raj Singh Intelligent phishing URL detection using association rule mining Humancentric Computing and Information Sciences, 6 (1) (2016)
  18. A.K. Jain, B.B. Gupta towards detection of phishing websites on client-side using machine learning based approach telecommunication Systems, 68 (4) (2018), p. 687
  19. T. Peng, I. Harris, Y. Sawa detecting phishing attacks using natural language processing and machine learning IEEE 12th international conference on semantic computing (ICSC), Laguna Hills, CA (2018),
pp. 300-301
  1. P. Prakash, M. Kumar, R.R. Kompella, M. Gupta Phish net: Predictive block-listing to detect phishing attacks 2010 Proceedings IEEE INFOCOM (2010), pp. 1-5
  2. S. Aonzo, A. Merlo, G. Tavella, and Y. Fratantonio, “Phishing attacks on modern android,” Proc. ACM Conf. Comput. Commun. Secur., pp. 1788–1801, 2018, Doi: 10.1145/3243734.3243778.
  3. Chen J., Guo C. Online detection, and prevention of phishing attacks (Invited Paper) First International Conference on Communications and Networking in China, ChinaCom ’06, IEEE, Beijing (2006)
  4. Zhang H, Liu G, Chow TWS, Liu W (2011) Textual and visual content-based anti-phishing: an approach. IEEE Trans Neural Newt 22(10):1532–1546
  5. Lee S, Kim J (2013) Warningbird: a near real-time detection
  6. system for suspicious URLs in twitter stream. IEEE Trans Depend Secure Comput 10(3):183–195
  7. Li T, Kou G, Peng Y (2020b) Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf Syst 91:101494
  8. Yang L, Zhang J, Wang X, Li Z, Li Z, He Y (2021) An improved elmbased and data preprocessing integrated approach for phishing detection
  9. De La Torre Parra G, Rad P, Choo KKR, Beebe N (2020) Detecting internet of things attacks using distributed deep learning. J Netw Comput Appl 163:102662
  10. Kirda, Engin, and Christopher Kruegel. ”Protecting users against phishing attacks with antiphish.” 29th Annual International Computer Software and Applications Conference (COMPSAC’05) . Vol. 1. IEEE, 2005.
  11. Kumar, Gaurav. ”Best plan to protect against phone phishing attack.”American Journal of Computer Science and Information Technology3.5 (2015): 167-172.
  12. Chuenchujit, T. 2016. A taxonomy of phishing research, University of Illinoi
  13. J. Hong, “The State of Phishing Attacks
  14. Krieg, G. And Kopan, T. 2016. CNN News, is this the email that
  15. Herzberg, Amir, and Ahmad Garba, “Trust bar: Protecting (Even naive) web users from spoofing and phishing attacks.” Computer Science Department Bar Ilan University, PP 1-28, Jul 2004.
  16. Jian Mao, Pei Li, Kun Li, Tao Wei, and Zhenkai Liang, “Bait AlarmDetecting Phishing Sites Using Similarity in Fundamental Visual Features,” Intelligent Networking and Collaborative Systems (IN-CoS), 2013 5th International Conference on Intelligent Networking and Collaborative System, PP. 790-795, 2013, Xi’an.
  17. Eric Medvet, Engin Kirda, and Christopher Kruegel, “Visual- Similarity-Based Phishing Detection,” SecureComm ’08 Proceedings of the fourth international conference on Security and privacy in communication networks, Article no 2, PP. 1-11, 2008.
  18. Safe Browsing API – Google Developer, available at: https://developers.google.com/safe–browsing/
  19. Juan Chen, and Chuanxiong Guo, “Online Detection and Prevention of Phishing Attacks,” Communications a