Abstract
Email or malicious websites are used to collect user login credentials and are provided to the attackers in the phishing attack which is also considered to be the type of social engineering attack. Mid January 2017, many Gmail users all over the world experienced Gmail Phishing attack. The attackers used extraordinarily intelligent mechanism containing a duplicate but looking very real Gmail sign in page.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Addady M (2016) Beware of this latest IRS phishing scam. Fortune 14 Mar 2016. http://fortune.com/2016/03/14/irs-phishing-scam/
Afroz S, Greenstadt R (2011) PhishZoo: detecting phishing websites by looking at them. In: Fifth IEEE international conference on semantic computing (ICSC)
Aggarwal A, Rajadesingan A, Kumaraguru P (2013) PhishAri: automatic realtime phishing detection on twitter. Soc Inf Netw (cs.SI); Phys Soc
Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. In: Soft computing applications in industry, volume 226 of the series Studies in Fuzziness and Soft Computing. Springer, pp 373–383
Bisson D (2016) 6 common phishing attacks and how to protect against them. Tripwire-The State of Security. https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/
Chaudhry JA, Chaudhry SA, Rittenhouse RG (2016) Phishing attacks and defenses. Int J Secur Appl 10(1):247–256
Chen J, Guo C (2006) The detection and prevention of phishing attacks. In: IEEE first international conference on communications and networking in China, ChinaCom’06
Dhanalakshmi R, Prabhu C, Chellapan C (2011) Detection of phishing websites and secure transactions. Int J Commun Netw Secur (IJCNS) I(II)
Dong X, Clark JA, Jacob JL (2008) User behavior based phishing websites detection. In: Proceedings of the international multi-conference on computer science and information technology, pp 783–790
Egan G (2019) State of the phish report: attack rates rise, account compromise soars. Proofpoint, Threat Protection Blog. https://www.proofpoint.com/us/corporate-blog/post/2019-state-phish-report-attack-rates-rise-account-compromise-soars
Jain A, Richariya V (2011) Implementing a web browser with phishing detection techniques. World Comput Sci Inf Technol J (WCSIT) 1(7):289–291
Lord N (2018) What is a phishing attack? Defining and identifying different types of phishing attacks. Digital Guardian Blog. https://digitalguardian.com/blog/what-phishing-attack-defining-and-identifying-different-types-phishing-attacks
Mukaram A (2014) Cyber threat landscape: basic overview and attack methods. Cyber Threat Intelligence, 3 June 2014. https://www.recordedfuture.com/cyber-threat-landscape-basics/
Rosiello APE, Kirda E, Kruegel C, Ferrandi F (2007) A layout-similarity-based approach for detecting phishing pages. In: Third IEEE international conference on security and privacy in communications networks and the workshops, SecureComm2007
Sulleyman A (2017) Gmail phishing: latest cyber attack infects users by mimicking past emails. Independent, 17 Jan 2017. http://www.independent.co.uk/life-style/gadgets-and-tech/news/gmail-phishing-latest-cyber-security-attack-hacking-infect-users-mimicking-past-emails-a7531981.html
White JS, Matthews JN, Stacy JL (2012) A method for the automated detection of phishing websites through both site characteristics and image analysis. In; Proceedings of SPIE 8408, cyber sensing
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Phishing. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)