Phishing Attacks and Defenses

A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Security and Its Applications Vol. 10; no. 1; pp. 247 - 256
Main Authors Chaudhry, Junaid Ahsenali, Chaudhry, Shafique Ahmad, Rittenhouse, Robert G.
Format Journal Article
LanguageEnglish
Published 01.01.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker. Phishing is a hybrid attack combining both social engineering and technological aspects and combatting phishing attacks requires dealing with both aspects
AbstractList A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker. Phishing is a hybrid attack combining both social engineering and technological aspects and combatting phishing attacks requires dealing with both aspects
Author Chaudhry, Shafique Ahmad
Chaudhry, Junaid Ahsenali
Rittenhouse, Robert G.
Author_xml – sequence: 1
  givenname: Junaid Ahsenali
  surname: Chaudhry
  fullname: Chaudhry, Junaid Ahsenali
– sequence: 2
  givenname: Shafique Ahmad
  surname: Chaudhry
  fullname: Chaudhry, Shafique Ahmad
– sequence: 3
  givenname: Robert G.
  surname: Rittenhouse
  fullname: Rittenhouse, Robert G.
BookMark eNqFj81KxDAUhYOM4DjOE4jSF2jNT5P0LofRUWFAF7oOSZo60ZpKko1vb6cjIm7kLs7lwHfgO0WzMASH0DnBFakpl1f-NXldUUxEte8qyo7QnEjWlABSzH79J2iZkjcY1wIASzpHF487n3Y-vBSrnLV9S4UObXHtOheSS2fouNN9csvvXKDnzc3T-q7cPtzer1fb0jIicymNkbQFMiYZxzngmjjO5XgtbQzwjuuGacMNt6AdBiLqjjrb1lIS2QBbIDjs2jikFF2nrM86-yHkqH2vCFaTqppU1V516hRlI8v-sB_Rv-v4-Q91eaCcjtnb3v1QVEADgn0BiAFjqQ
CitedBy_id crossref_primary_10_1109_JSYST_2022_3168234
crossref_primary_10_1177_08944393211046339
crossref_primary_10_1016_j_eswa_2018_03_050
crossref_primary_10_1016_j_procs_2017_05_352
crossref_primary_10_1016_j_procs_2020_04_119
crossref_primary_10_1109_JSEN_2018_2879929
crossref_primary_10_1177_02666669221116336
crossref_primary_10_4018_IJMDEM_2018010104
crossref_primary_10_1109_ACCESS_2020_2968045
crossref_primary_10_1109_ACCESS_2024_3403197
crossref_primary_10_2139_ssrn_3176319
crossref_primary_10_1155_2018_1798659
crossref_primary_10_1177_10567879221082966
crossref_primary_10_1109_ACCESS_2024_3505983
crossref_primary_10_1080_01639625_2023_2244115
crossref_primary_10_17694_bajece_435864
crossref_primary_10_1016_j_eswa_2021_116239
crossref_primary_10_2139_ssrn_3062331
crossref_primary_10_4018_IJSWIS_361772
crossref_primary_10_21848_asr_2019_15_4_241
crossref_primary_10_1007_s10639_021_10806_7
crossref_primary_10_35940_ijitee_H9680_0712823
crossref_primary_10_1109_ACCESS_2022_3168681
ContentType Journal Article
DBID M1Z
AAYXX
CITATION
DOI 10.14257/ijsia.2016.10.1.23
DatabaseName e-articles
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
EISSN 1738-9976
EndPage 256
ExternalDocumentID 10_14257_ijsia_2016_10_1_23
269896
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
KQ8
M1Z
.DC
AAYXX
CITATION
ID FETCH-LOGICAL-c317t-7bb72d917bb1b0059041e557575d28b95f5a83ab5b5c9ae09164f2ecd47717893
ISSN 1738-9976
IngestDate Tue Jul 01 04:14:11 EDT 2025
Thu Apr 24 23:08:05 EDT 2025
Thu Oct 21 14:34:44 EDT 2021
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 1
Keywords cybercrime
Phishing
cyber security
community computing
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c317t-7bb72d917bb1b0059041e557575d28b95f5a83ab5b5c9ae09164f2ecd47717893
OpenAccessLink https://doi.org/10.14257/ijsia.2016.10.1.23
PageCount 10
ParticipantIDs crossref_citationtrail_10_14257_ijsia_2016_10_1_23
crossref_primary_10_14257_ijsia_2016_10_1_23
earticle_primary_269896
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-01
  day: 01
PublicationDecade 2010
PublicationTitle International Journal of Security and Its Applications
PublicationYear 2016
SSID ssib004699072
Score 2.2128773
Snippet A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common...
SourceID crossref
earticle
SourceType Enrichment Source
Index Database
Publisher
StartPage 247
TableOfContents Abstract 1. Introduction 2. Problem Description 2.1 Defenses 3. Related Work 3.1 Human Detection 3.2 Machine Detection 4. Discussion: Phishing Countermeasures 4.1. Client-Side tools 4.2 Server-Side Protection 4.3. Other Players 5. Conclusion References
Title Phishing Attacks and Defenses
URI http://www.earticle.net/Article.aspx?sn=269896
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT4MwFG50XrwYjb91hoNHmbRAgeNiNItGo3FLdiNtoXGL2YzDi3-979HCcFOjXggpPwrvg9evL33fI-SU6xiIbiZcAVzADajy3SQW2o0U1UzrhCsPc4dv73hvEFwPw-FcS6fMLilkR71_mVfyH1ShDXDFLNk_IFvfFBpgH_CFLSAM219hfP9kI0jdosBcebuuWMPU1C4NHM8Xqn-O-1kS-mjL15llwcXMsNJmGM9GBGgzImCcWIROLDF1VWov5y2haV2WUby0ox8zMt9LjhV_bTDHaDwboVoT5R1s7Zhc4QXFaoZFKfkqWWNA3dH33Dw0xj8O419ZU6t-TCsGhV2cL3ewQBissRskoL9JNqzhnK45ukVW8sk2aVcwOBYGB4zpVDDskMHVZf-i59qqE64CLlW4kZQRy2AWKyWVZW5uQPMQvuQozFgsk1CHIvaFDGWoEpED3-KBZrnKggimxkD_dklrMp3k-8TJvCRWnvRyxYHmUbidr0Xs-RnVMerMHRBWvVqqrCQ7VgZ5TnFqhvZIS3ukaI-yLWVw0Vl90YtRJPn59L3KZvXpBqDDb48ckfX5d3VMWsXrW94G7lXIkxLMD1btLDY
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Phishing+Attacks+and+Defenses&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.date=2016-01-01&rft.issn=1738-9976&rft.volume=10&rft.issue=1&rft.spage=247&rft.epage=256&rft_id=info:doi/10.14257%2Fijsia.2016.10.1.23&rft.externalDocID=269896
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon