Detecting Phishing Sites – An Overview

03/23/2021
by   P. Kalaharsha, et al.
0

Phishing is one of the most severe cyber-attacks where researchers are interested to find a solution. In phishing, attackers lure end-users and steal their personal in-formation. To minimize the damage caused by phishing must be detected as early as possible. There are various phishing attacks like spear phishing, whaling, vishing, smishing, pharming and so on. There are various phishing detection techniques based on white-list, black-list, content-based, URL-based, visual-similarity and machine-learning. In this paper, we discuss various kinds of phishing attacks, attack vectors and detection techniques for detecting the phishing sites. Performance comparison of 18 different models along with nine different sources of datasets are given. Challenges in phishing detection techniques are also given.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/27/2022

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

DDoS attacks, also known as distributed denial of service (DDoS) attacks...
research
06/09/2023

Detecting Phishing Sites Using ChatGPT

The rise of large language models (LLMs) has had a significant impact on...
research
05/03/2022

Detecting Phishing sites Without Visiting them

Now-a-days, cyberattacks are increasing at an unprecedented rate. Phishi...
research
07/25/2018

Architectures for Detecting Real-time Multiple Multi-stage Network Attacks Using Hidden Markov Model

With the growing Cyber threats, the need to develop high assurance Cyber...
research
04/05/2022

Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models

Web-based phishing attacks nowadays exploit popular cloud web hosting se...
research
05/11/2019

HSTS Preloading is Ineffective as a Long-Term, Wide-Scale MITM-Prevention Solution: Results from Analyzing the 2013 - 2017 HSTS Preload List

HSTS (HTTP Strict Transport Security) serves to protect websites from ce...
research
09/28/2020

Anonymity with Tor: A Survey on Tor Attacks

Anonymity networks are becoming increasingly popular in today's online w...

Please sign up or login with your details

Forgot password? Click here to reset