Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Phishing detection: a literature survey

M Khonji, Y Iraqi, A Jones - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
This article surveys the literature on the detection of phishing attacks. Phishing attacks target
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …

Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Phishing detection: analysis of visual similarity based approaches

AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …

Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages

Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan… - 30th USENIX Security …, 2021 - usenix.org
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …

A novel approach to protect against phishing attacks at client side using auto-updated white-list

AK Jain, BB Gupta - EURASIP Journal on Information Security, 2016 - Springer
Most of the anti-phishing solutions are having two major limitations; the first is the need of a
fast access time for a real-time environment and the second is the need of high detection …

Adopting automated whitelist approach for detecting phishing attacks

NA Azeez, S Misra, IA Margaret, L Fernandez-Sanz - Computers & Security, 2021 - Elsevier
Phishing is considered a great scourge in cyberspace. Presently, there are two major
challenges known with the existing anti-phishing solutions. Low detection rate and lack of …

Systematization of knowledge (sok): A systematic review of software-based web phishing detection

Z Dou, I Khalil, A Khreishah… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Phishing is a form of cyber attack that leverages social engineering approaches and other
sophisticated techniques to harvest personal information from users of websites. The …

[PDF][PDF] 机器学习在网络空间安全研究中的应用

张蕾, 崔勇, 刘静, 江勇, 吴建平 - 计算机学报, 2018 - cjc.ict.ac.cn
摘要随着云计算, 物联网, 大数据等新兴技术的迅猛发展, 数以亿计的网络接入点,
联网设备以及网络应用产生的海量数据, 给网络空间安全带来了巨大的困难和挑战 …