Skip to main content

A Review of Anti-phishing Techniques and its Shortcomings

  • Conference paper
  • First Online:
Cyber Security and Digital Forensics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 73))

Abstract

Phishing has become one of the most common activities observed over the Internet quite often. To investigate the methods through which phishing can not only be detected but can also be controlled, a lot of researchers have contributed and have opened gates for the industry. This paper illustrates the types of phishing attacks and ways to optimize the anti-phishing architecture. The highlights of this paper are listing down the ways to detect phishing activities over web services. The analyzed techniques are compared on the basis of suitable comparative parameters listed in reputed articles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammad, R.M., Thabtah, F., McCluskey, L.: Tutorial and Critical Analysis of Phishing Websites Methods, pp. 1–24. Elsevier (2015)

    Google Scholar 

  2. Waziri Jr., I.: Website forgery: understanding phishing attacks & nontechnical countermeasures. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

    Google Scholar 

  3. Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4) (2013)

    Google Scholar 

  4. Shekokar, N.M., Shah, C., Mahajan, M., Rachh, S.: An ideal approach for detection and prevention of phishing attacks. Proc. Comput. Sci. 82–91 (2015) (Elsevier)

    Google Scholar 

  5. Nazreen Banu, M., Munawara Banu, S.: A comprehensive study of phishing attacks. Int. J. Comput. Sci. Inf. Technol. 4(6), 783–786 (2013)

    Google Scholar 

  6. Gupta, S., Singhal, A., Kapoor, A.: A literature survey on social engineering attacks: phishing attack. In: International Conference on Computing, Communication and Automation, 2016

    Google Scholar 

  7. Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur. 1–11 (2016)

    Google Scholar 

  8. Zhang, Y., Hong, J., Cranor, L.: CANTINA: a content-based approach to detecting phishing web sites. In: ACM Proceedings of 16th International Conference on World Wide Web, pp. 639–648, May 2007

    Google Scholar 

  9. Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(2), 1–32 (2011)

    Article  Google Scholar 

  10. Carolin Jeeva, S., Rajsingh, E.B.: Intelligent phishing url detection using association rule mining. SpringerOpen Hum. Centric Comput. Inf. Sci. 1–19 (2016)

    Google Scholar 

  11. Liu, W., Deng, X., Huang, G., Fu, A.Y.: An antiphishing strategy based on visual similarity assessment. IEEE Comput. Soc. 58–65 (2006)

    Google Scholar 

  12. Chen, K.-T., Huang, C.-R., Chen, C.-S.: Fighting phishing with discriminative keypoint features. IEEE Comput. Soc. 56–63 (2009)

    Google Scholar 

  13. Nirmal, K., Janet, B., Kumar, R.: Phishing—the threat that still exists. In: IEEE International Conference on Computing and Communications Technologies, 2015

    Google Scholar 

  14. Iuga, C., Nurse, J.R.C., Erola, A.: Baiting the hook: factors impacting susceptibility to phishing attacks. Hum. Cent. Comput. Inf. Sci., SpringerOpen (2016)

    Google Scholar 

  15. Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30, 719–731 (2011) (Elsevier)

    Google Scholar 

  16. Parsons, K., McCormac, A., Pattinson, M., Butavicius, M., Jerram, C.: The design of phishing studies: challenges for researchers. Comput. Secur. 52, 194–206 (2015) (Elsevier)

    Google Scholar 

  17. Montazer, G.A., Yarmohammadi, S.A.: Identifying the critical indicators for phishing detection in iranian e-banking system. In: IEEE 5th Conference on Information and Knowledge Technology, 2013

    Google Scholar 

  18. Chu, W., Zhu, B.B., Xue, F., Guan, X., Cai, Z.: Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. In: IEEE Communication and Information Systems Security Symposium, 2013

    Google Scholar 

  19. Alhothaily, A., Chunquiang, Hu., Alwaris, A., Song, T., Cheng, X., Chen, D.: A secure and practical authentication scheme using personal devices. IEEE Access 5, 11677–11687 (2017)

    Article  Google Scholar 

  20. Wu, L., Du, X., Wu, J.: Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Trans. Veh. Technol. (2015) (Accepted for publication)

    Google Scholar 

  21. Moghimi, M., Varjan, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. (2016) (Accepted for publication)

    Google Scholar 

  22. Hadi, W., Aburub, F., Alhawari, S.: A new fast associative classification algorithm for detecting phishing websites. Appl. Soft Comput. 48, 729–734 (2016) (Elsevier)

    Google Scholar 

  23. Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016)

    Article  Google Scholar 

  24. Lin, G., Sun, N., Nepal, S., Zhang, J., Xiang, Y., Hassan, H.: Statistical twitter spam detection demystified: performance, stability and scalability. IEEE Access, Special Section on Big Data Analytics in Internet of Things and Cyber-physical Systems 5, 11142–11154 (2017)

    Google Scholar 

  25. Almomani, A., Gupta, B.B., Atawneh, S., Meulenberg, A., Almomani, E.: A survey of phishing email filtering techniques. IEEE Commun. Surv. Tutorials 15(4) (2013)

    Google Scholar 

  26. Mujtaba, G., Shuib, L., Raj, R.G., Majeed, N., Al-Garadi, M.A.: Email classification research trends: review and open issues. IEEE Access 5, 9044–9064 (2017)

    Google Scholar 

  27. Wang, J., Herath, T., Chen, R., Vishwanath, A., Raghav Rao H.: Phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 55(4), 345–362 (2012)

    Google Scholar 

  28. Heartfield, R., Loukas, G., Gan, D.: You are probably not the weakest link: towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access 4, 6910–6928 (2016)

    Article  Google Scholar 

  29. Marchal, S., François, J., State, R., Engel, T.: PhishStorm: detecting phishing with streaming analytics. IEEE Trans. Netw. Serv. Manage. 11(4) (2014)

    Google Scholar 

  30. Vishwanath, A.: Mobile device affordance: explicating how smartphones influence the outcome of phishing attacks. Comput. Hum. Behav. 63, 198–207 (2016)

    Article  Google Scholar 

  31. Sonowal, G., Kuppusamy, K.S.: PhiDMA—a phishing detection model with multi-filter approach. J. King Saud Univ. Comput. Inf. Sci. 1–14 (2017)

    Google Scholar 

  32. Sönmez, Y., Tuncer, T., Gökal, H., Avcr, E.: Phishing web sites features classification based on extreme learning machine. In: 6th International Symposium on Digital Forensic and Security, pp. 1–5, 2018

    Google Scholar 

  33. Oest, A., Safei, Y., Doupé, A., Ahn, G.-J., Wardman, B., Warner, G.: Inside a phisher’s mind: understanding the anti-phishing ecosystem through phishing kit analysis. In: APWG Symposium on Electronic Crime Research, pp. 1–12, 2018

    Google Scholar 

  34. Karabatak, M., Mustafa, T.: Performance comparison of classifiers on reduced phishing website dataset. In: IEEE, pp. 1–5, 2018

    Google Scholar 

  35. Le Page, S., Jourdan, G.-V., Bochmann, G.v., Flood, J., Onut, I.-V.: Using URL shorteners to compare phishing and malware attacks. In: IEEE, pp. 1–13, 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, B., Singh, P. (2022). A Review of Anti-phishing Techniques and its Shortcomings. In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds) Cyber Security and Digital Forensics . Lecture Notes on Data Engineering and Communications Technologies, vol 73. Springer, Singapore. https://doi.org/10.1007/978-981-16-3961-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3961-6_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3960-9

  • Online ISBN: 978-981-16-3961-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics