2021
DOI: 10.48550/arxiv.2103.12739
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Detecting Phishing Sites -- An Overview

P. Kalaharsha,
B. M. Mehtre

Abstract: Phishing is one of the most severe cyber-attacks where researchers are interested to find a solution. In phishing, attackers lure end-users and steal their personal information. To minimize the damage caused by phishing must be detected as early as possible. There are various phishing attacks like spear phishing, whaling, vishing, smishing, pharming and so on. There are various phishing detection techniques based on whitelist, black-list, content-based, URL-based, visualsimilarity and machine-learning. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Smishing detection identifies malicious SMS messages by consulting blacklist/whitelist data [21] or by analyzing message content [3], [22], web page appearance [23], and downloaded Android application packages (APKs) [24]. The authors in [2] compared the performance of 18 existing detection algorithms using nine different datasets and demonstrated that most of the algorithms achieved accuracies of more than 95%. According to our data analysis, "message arrival times," which was neglected in previous studies, should be considered because bots sent smishing messages at the same time every day.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Smishing detection identifies malicious SMS messages by consulting blacklist/whitelist data [21] or by analyzing message content [3], [22], web page appearance [23], and downloaded Android application packages (APKs) [24]. The authors in [2] compared the performance of 18 existing detection algorithms using nine different datasets and demonstrated that most of the algorithms achieved accuracies of more than 95%. According to our data analysis, "message arrival times," which was neglected in previous studies, should be considered because bots sent smishing messages at the same time every day.…”
Section: Related Workmentioning
confidence: 99%
“…There are several high-performance solutions for detecting malicious SMS messages [2], illegitimate uniform resource locators (URLs) [3], and mobile botnets [4], all of which achieve accuracies of more than 95%. However, smishing remains a problem in many countries [5]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…We will check the URL and settle on this website to monitor this. The selection of established phishing sites to find unknown phishing sites is one way to identify phishing [36][37][38]. The study of web functionality is another means of finding out the bogus websites.…”
Section: Introductionmentioning
confidence: 99%
“…In email phishing, the links are sent to the victim, and the phishing process initiates upon clicking the links. These phishing links can be spread using SMSs, also known as SMS phishing or smishing attacks [6]. The same process performed through telephone lines is known as vishing attacks [7].…”
Section: Introductionmentioning
confidence: 99%