• Ramjee PrasadEmail author
  • Vandana Rohokale
Part of the Springer Series in Wireless Technology book series (SSWT)


Email or malicious websites are used to collect user login credentials and are provided to the attackers in the phishing attack which is also considered to be the type of social engineering attack. Mid January 2017, many Gmail users all over the world experienced Gmail Phishing attack. The attackers used extraordinarily intelligent mechanism containing a duplicate but looking very real Gmail sign in page.


  1. Addady M (2016) Beware of this latest IRS phishing scam. Fortune 14 Mar 2016.
  2. Afroz S, Greenstadt R (2011) PhishZoo: detecting phishing websites by looking at them. In: Fifth IEEE international conference on semantic computing (ICSC)Google Scholar
  3. Aggarwal A, Rajadesingan A, Kumaraguru P (2013) PhishAri: automatic realtime phishing detection on twitter. Soc Inf Netw (cs.SI); Phys SocGoogle Scholar
  4. Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. In: Soft computing applications in industry, volume 226 of the series Studies in Fuzziness and Soft Computing. Springer, pp 373–383Google Scholar
  5. Bisson D (2016) 6 common phishing attacks and how to protect against them. Tripwire-The State of Security.
  6. Chaudhry JA, Chaudhry SA, Rittenhouse RG (2016) Phishing attacks and defenses. Int J Secur Appl 10(1):247–256CrossRefGoogle Scholar
  7. Chen J, Guo C (2006) The detection and prevention of phishing attacks. In: IEEE first international conference on communications and networking in China, ChinaCom’06Google Scholar
  8. Dhanalakshmi R, Prabhu C, Chellapan C (2011) Detection of phishing websites and secure transactions. Int J Commun Netw Secur (IJCNS) I(II)Google Scholar
  9. Dong X, Clark JA, Jacob JL (2008) User behavior based phishing websites detection. In: Proceedings of the international multi-conference on computer science and information technology, pp 783–790Google Scholar
  10. Egan G (2019) State of the phish report: attack rates rise, account compromise soars. Proofpoint, Threat Protection Blog.
  11. Jain A, Richariya V (2011) Implementing a web browser with phishing detection techniques. World Comput Sci Inf Technol J (WCSIT) 1(7):289–291Google Scholar
  12. Lord N (2018) What is a phishing attack? Defining and identifying different types of phishing attacks. Digital Guardian Blog.
  13. Mukaram A (2014) Cyber threat landscape: basic overview and attack methods. Cyber Threat Intelligence, 3 June 2014.
  14. Rosiello APE, Kirda E, Kruegel C, Ferrandi F (2007) A layout-similarity-based approach for detecting phishing pages. In: Third IEEE international conference on security and privacy in communications networks and the workshops, SecureComm2007Google Scholar
  15. Sulleyman A (2017) Gmail phishing: latest cyber attack infects users by mimicking past emails. Independent, 17 Jan 2017.
  16. White JS, Matthews JN, Stacy JL (2012) A method for the automated detection of phishing websites through both site characteristics and image analysis. In; Proceedings of SPIE 8408, cyber sensingGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations