Affiliation:
1. North South University, Bangladesh
2. LUT University, Finland
Abstract
The phishing attack targets the client's email and any other connection medium to illicitly get the user credentials of e-commerce websites, educational websites, banks, credit card information, and other crucial user information. Exploitations caused by different types of cyberattacks result in data loss, identity theft, financial loss, and various other adversaries on both human and infrastructure. Therefore, investigating the threats and vulnerabilities on web applications and analysis of recent cyberattacks on web applications can also provide a holistic scenario about the recent security standpoint. Therefore, in this chapter, phishing attack techniques and their current scenario will be discussed extensively. Moreover, recent phishing techniques will be discussed to understand the severity of this type of attack. Finally, this chapter will outline the proposed and existing countermeasures for protecting users' identities and credentials from the phishing technique.
Reference84 articles.
1. PhishZoo: Detecting Phishing Websites by Looking at Them
2. Phishing Attacks Survey: Types, Vectors, and Technical Approaches
3. Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
4. Phishing environments, techniques, and countermeasures: A survey
5. Alghoul, A., Al Ajrami, S., Al Jarousha, G., Harb, G., & Abu-Naser, S.S. (2018). Email Classification Using Artificial Neural Network. Int. J. Acad. Eng. Res.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献