2016
DOI: 10.1002/sec.1674
|View full text |Cite
|
Sign up to set email alerts
|

A survey and classification of web phishing detection schemes

Abstract: Phishing is a fraudulent technique that is used over the Internet to deceive users with the goal of extracting their personal information such as username, passwords, credit card, and bank account information. The key to phishing is deception. Phishing uses email spoofing as its initial medium for deceptive communication followed by spoofed websites to obtain the needed information from the victims. Phishing was discovered in 1996, and today, it is one of the most severe cybercrimes faced by the Internet users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
61
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(61 citation statements)
references
References 61 publications
0
61
0
Order By: Relevance
“…Classroom based discussions and training [33] and web-based ant-phishing training materials from organisations such as eBay, Microsoft, etc [38] are some of the methods used to impart anti-phishing training to the user. Recently, Hanna Alghamdi [6] developed a phishing quiz mobile application to check the phishing detection ability of the user and to assess efficacy of online anti-phishing educational materials.…”
Section: Introductionmentioning
confidence: 99%
“…Classroom based discussions and training [33] and web-based ant-phishing training materials from organisations such as eBay, Microsoft, etc [38] are some of the methods used to impart anti-phishing training to the user. Recently, Hanna Alghamdi [6] developed a phishing quiz mobile application to check the phishing detection ability of the user and to assess efficacy of online anti-phishing educational materials.…”
Section: Introductionmentioning
confidence: 99%
“…As another methodology, heuristics based approaches rely on the use of features revealed from text, image or URLspecific information from legitimate and phishing websites [6]. In general, these features are then utilized by use of machine learning algorithms to form a set of heuristics for further classification of phishing websites.…”
Section: Introductionmentioning
confidence: 99%
“…Websites. Three teams of researchers have surveyed phishing website detection [32], [274], [275]. In [274], phishing website detection papers were studied along five dimensions: blacklist/whitelist, instantaneous protection, decision support tools, community rating tools such as Web of Trust, and intelligent heuristics, for the first time.…”
Section: Related Workmentioning
confidence: 99%
“…In [274], phishing website detection papers were studied along five dimensions: blacklist/whitelist, instantaneous protection, decision support tools, community rating tools such as Web of Trust, and intelligent heuristics, for the first time. Subsequently, Varshney et al [275] added search-based, visual-similarity, DNS-based, and proactive phishing URL based techniques. They also discussed pros and cons for each type of detection technique and some selected papers, for which they summarized results and dataset sizes.…”
Section: Related Workmentioning
confidence: 99%