Phishing Attacks and It's Various Defences

Authors(2) :-Surbhi Sharma, Deo Prakash

Phishing is primarily a venture executed by cybercriminals to gain access to the important information of the users viz. passwords, emails, bank details, corporate stats, etcetera to swindle them. Phishing is somehow related to fishing in a lake, but here instead of capturing a fish, phishers try to steal the information of the unsuspected users. It is predominantly carried through by spamming some fancy trending but fallacious emails which catches the eye of the users and if they proceed into enquiring about it by entering the page and filling in their credentials as asked by the page, they fall into the trap and suffer at the hands of the phishers. Purpose of this disquisition is to identify the various deceiving techniques being exercised by the phishers to purloin the crucial information of their victims. I will also discuss how we can detect various phishing attacks and prevent them from harming you.

Authors and Affiliations

Surbhi Sharma
M.Tech, Dept. of computer science, Shri Mata Vaishno Devi University, J&K, India
Deo Prakash
Asst. Professor, Dept. of computer science, Shri Mata Vaishno Devi University, J&K, India

Phishing; Phishers ; AOI accounts; Deceptive; key loggers ; Ransomware

  1. Junaid Ahsenali Chaudhry, Shafique Ahmad Chaudhry, Robert G. Rittenhouse,2016, Phishing attacks and defences, International Journal of Security and Its Applications V ol. 10, No. 1 (2016), pp.247-25
  2. Mohd. Mahmood Ali, Owais A.W. Siddiqui, Mohd. Nayeemuddin and Lakhsmi Rajamani, 2015, An approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and WordNet Ontology.
  3. “what are the various types of phishing?”; google help; http://www.phishing.org/phishing-techniques
  4. “keylogger” http://www.webopedia.com/TERM/K/keylogger.html
  5. Mahmoud Khonji, Youssef Iraqi, Senior Member, IEEE, and Andrew Jones,2013, Phishing Detection: A Literature Survey
  6. Arpan chandel.et.al. Phishing attacks and its countermeasures, 2017, IJARC.

Publication Details

Published in : Volume 4 | Issue 1 | March-April 2018
Date of Publication : 2018-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 268-274
Manuscript Number : CSEIT411845
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Surbhi Sharma, Deo Prakash, "Phishing Attacks and It's Various Defences", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.268-274, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT411845

Article Preview