Phishing Attacks and It's Various Defences

Authors

  • Surbhi Sharma  M.Tech, Dept. of computer science, Shri Mata Vaishno Devi University, J&K, India
  • Deo Prakash  Asst. Professor, Dept. of computer science, Shri Mata Vaishno Devi University, J&K, India

Keywords:

Phishing; Phishers ; AOI accounts; Deceptive; key loggers ; Ransomware

Abstract

Phishing is primarily a venture executed by cybercriminals to gain access to the important information of the users viz. passwords, emails, bank details, corporate stats, etcetera to swindle them. Phishing is somehow related to fishing in a lake, but here instead of capturing a fish, phishers try to steal the information of the unsuspected users. It is predominantly carried through by spamming some fancy trending but fallacious emails which catches the eye of the users and if they proceed into enquiring about it by entering the page and filling in their credentials as asked by the page, they fall into the trap and suffer at the hands of the phishers. Purpose of this disquisition is to identify the various deceiving techniques being exercised by the phishers to purloin the crucial information of their victims. I will also discuss how we can detect various phishing attacks and prevent them from harming you.

References

  1. Junaid Ahsenali Chaudhry, Shafique Ahmad Chaudhry, Robert G. Rittenhouse,2016, Phishing attacks and defences, International Journal of Security and Its Applications V ol. 10, No. 1 (2016), pp.247-25
  2. Mohd. Mahmood Ali, Owais A.W. Siddiqui, Mohd. Nayeemuddin and Lakhsmi Rajamani, 2015, An approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and WordNet Ontology.
  3. “what are the various types of phishing?”; google help; http://www.phishing.org/phishing-techniques
  4. “keylogger” http://www.webopedia.com/TERM/K/keylogger.html
  5. Mahmoud Khonji, Youssef Iraqi, Senior Member, IEEE, and Andrew Jones,2013, Phishing Detection: A Literature Survey
  6. Arpan chandel.et.al. Phishing attacks and its countermeasures, 2017, IJARC.

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Surbhi Sharma, Deo Prakash, " Phishing Attacks and It's Various Defences, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.268-274, March-April-2018.