Abstract
PurposePhishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publication outlets. In addition to that, this paper aims to identify the important trends in phishing and its countermeasures and provides a view of the research gap that is still prevailing in this field of study.Design/methodology/approachThis paper is a comprehensive literature review prepared after analysing 16 doctoral theses and 358 papers in this field of research. The papers were analyzed based on their research focus, empirical basis on phishing and proposed countermeasures.FindingsThe findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories. Also, the different approaches proposed so far are all preventive in nature. A Phisher will mainly target the innocent consumers who happen to be the weakest link in the security chain and it was found through various usability studies that neither server‐side security indicators nor client‐side toolbars and warnings are successful in preventing vulnerable users from being deceived.Originality/valueEducating the internet users about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against phishing attacks. Further research is required to evaluate the effectiveness of the available countermeasures against fresh phishing attacks. Also there is the need to find out the factors which influence internet user's ability to correctly identify phishing websites.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference208 articles.
1. Abu‐Nimeh, S. (2008), “Phishing detection using distributed Bayesian additive regression trees”, unpublished doctoral dissertation, Southern Methodist University, Dallas, TX.
2. Aburrous, M., Hossain, M.A., Dahal, K. and Thabtah, F. (2010), “Experimental case studies for investigating e‐banking phishing techniques and attack strategies”, Cognitive Computation, Vol. 2 No. 3, pp. 242‐53.
3. Adida, B. (2007), “BeamAuth: two‐factor web authentication with a bookmark”, Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.
4. Adida, B., Hohenberger, S. and Rivest, R. (2005a), “Fighting phishing attacks: a lightweight trust architecture for detecting spoofed emails”, paper presented at DIMACS Workshop on Theft in E‐commerce.
5. Adida, B., Hohenberger, S. and Rivest, R. (2005b), “Lightweight encryption for e‐mail”, paper presented at USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI).
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献