Phishing Attacks and Defenses
A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually...
Saved in:
Published in | International Journal of Security and Its Applications Vol. 10; no. 1; pp. 247 - 256 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
01.01.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker. Phishing is a hybrid attack combining both social engineering and technological aspects and combatting phishing attacks requires dealing with both aspects |
---|---|
AbstractList | A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker. Phishing is a hybrid attack combining both social engineering and technological aspects and combatting phishing attacks requires dealing with both aspects |
Author | Chaudhry, Shafique Ahmad Chaudhry, Junaid Ahsenali Rittenhouse, Robert G. |
Author_xml | – sequence: 1 givenname: Junaid Ahsenali surname: Chaudhry fullname: Chaudhry, Junaid Ahsenali – sequence: 2 givenname: Shafique Ahmad surname: Chaudhry fullname: Chaudhry, Shafique Ahmad – sequence: 3 givenname: Robert G. surname: Rittenhouse fullname: Rittenhouse, Robert G. |
BookMark | eNqFj81KxDAUhYOM4DjOE4jSF2jNT5P0LofRUWFAF7oOSZo60ZpKko1vb6cjIm7kLs7lwHfgO0WzMASH0DnBFakpl1f-NXldUUxEte8qyo7QnEjWlABSzH79J2iZkjcY1wIASzpHF487n3Y-vBSrnLV9S4UObXHtOheSS2fouNN9csvvXKDnzc3T-q7cPtzer1fb0jIicymNkbQFMiYZxzngmjjO5XgtbQzwjuuGacMNt6AdBiLqjjrb1lIS2QBbIDjs2jikFF2nrM86-yHkqH2vCFaTqppU1V516hRlI8v-sB_Rv-v4-Q91eaCcjtnb3v1QVEADgn0BiAFjqQ |
CitedBy_id | crossref_primary_10_1109_JSYST_2022_3168234 crossref_primary_10_1177_08944393211046339 crossref_primary_10_1016_j_eswa_2018_03_050 crossref_primary_10_1016_j_procs_2017_05_352 crossref_primary_10_1016_j_procs_2020_04_119 crossref_primary_10_1109_JSEN_2018_2879929 crossref_primary_10_1177_02666669221116336 crossref_primary_10_4018_IJMDEM_2018010104 crossref_primary_10_1109_ACCESS_2020_2968045 crossref_primary_10_1109_ACCESS_2024_3403197 crossref_primary_10_2139_ssrn_3176319 crossref_primary_10_1155_2018_1798659 crossref_primary_10_1177_10567879221082966 crossref_primary_10_1109_ACCESS_2024_3505983 crossref_primary_10_1080_01639625_2023_2244115 crossref_primary_10_17694_bajece_435864 crossref_primary_10_1016_j_eswa_2021_116239 crossref_primary_10_2139_ssrn_3062331 crossref_primary_10_4018_IJSWIS_361772 crossref_primary_10_21848_asr_2019_15_4_241 crossref_primary_10_1007_s10639_021_10806_7 crossref_primary_10_35940_ijitee_H9680_0712823 crossref_primary_10_1109_ACCESS_2022_3168681 |
ContentType | Journal Article |
DBID | M1Z AAYXX CITATION |
DOI | 10.14257/ijsia.2016.10.1.23 |
DatabaseName | e-articles CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 1738-9976 |
EndPage | 256 |
ExternalDocumentID | 10_14257_ijsia_2016_10_1_23 269896 |
GroupedDBID | ALMA_UNASSIGNED_HOLDINGS KQ8 M1Z .DC AAYXX CITATION |
ID | FETCH-LOGICAL-c317t-7bb72d917bb1b0059041e557575d28b95f5a83ab5b5c9ae09164f2ecd47717893 |
ISSN | 1738-9976 |
IngestDate | Tue Jul 01 04:14:11 EDT 2025 Thu Apr 24 23:08:05 EDT 2025 Thu Oct 21 14:34:44 EDT 2021 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Keywords | cybercrime Phishing cyber security community computing |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c317t-7bb72d917bb1b0059041e557575d28b95f5a83ab5b5c9ae09164f2ecd47717893 |
OpenAccessLink | https://doi.org/10.14257/ijsia.2016.10.1.23 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_14257_ijsia_2016_10_1_23 crossref_primary_10_14257_ijsia_2016_10_1_23 earticle_primary_269896 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2016-01-01 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – month: 01 year: 2016 text: 2016-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | International Journal of Security and Its Applications |
PublicationYear | 2016 |
SSID | ssib004699072 |
Score | 2.2128773 |
Snippet | A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common... |
SourceID | crossref earticle |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 247 |
TableOfContents | Abstract
1. Introduction
2. Problem Description
2.1 Defenses
3. Related Work
3.1 Human Detection
3.2 Machine Detection
4. Discussion: Phishing Countermeasures
4.1. Client-Side tools
4.2 Server-Side Protection
4.3. Other Players
5. Conclusion
References |
Title | Phishing Attacks and Defenses |
URI | http://www.earticle.net/Article.aspx?sn=269896 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT4MwFG50XrwYjb91hoNHmbRAgeNiNItGo3FLdiNtoXGL2YzDi3-979HCcFOjXggpPwrvg9evL33fI-SU6xiIbiZcAVzADajy3SQW2o0U1UzrhCsPc4dv73hvEFwPw-FcS6fMLilkR71_mVfyH1ShDXDFLNk_IFvfFBpgH_CFLSAM219hfP9kI0jdosBcebuuWMPU1C4NHM8Xqn-O-1kS-mjL15llwcXMsNJmGM9GBGgzImCcWIROLDF1VWov5y2haV2WUby0ox8zMt9LjhV_bTDHaDwboVoT5R1s7Zhc4QXFaoZFKfkqWWNA3dH33Dw0xj8O419ZU6t-TCsGhV2cL3ewQBissRskoL9JNqzhnK45ukVW8sk2aVcwOBYGB4zpVDDskMHVZf-i59qqE64CLlW4kZQRy2AWKyWVZW5uQPMQvuQozFgsk1CHIvaFDGWoEpED3-KBZrnKggimxkD_dklrMp3k-8TJvCRWnvRyxYHmUbidr0Xs-RnVMerMHRBWvVqqrCQ7VgZ5TnFqhvZIS3ukaI-yLWVw0Vl90YtRJPn59L3KZvXpBqDDb48ckfX5d3VMWsXrW94G7lXIkxLMD1btLDY |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Phishing+Attacks+and+Defenses&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.date=2016-01-01&rft.issn=1738-9976&rft.volume=10&rft.issue=1&rft.spage=247&rft.epage=256&rft_id=info:doi/10.14257%2Fijsia.2016.10.1.23&rft.externalDocID=269896 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon |