Phishing Mitigation Techniques: A Literature Survey

04/14/2021
by   Nmachi Peace Wosah, et al.
0

Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an exploration into how phishing detection can be improved.

READ FULL TEXT

page 1

page 2

page 3

page 4

11/13/2020

An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques

Wireless Sensor Network (WSN) is the network of the future. As it gradua...
10/22/2020

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

Due to recent world events, video calls have become the new norm for bot...
03/11/2021

The Curse of Correlations for Robust Fingerprinting of Relational Databases

Database fingerprinting schemes have been widely adopted to prevent unau...
12/11/2020

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT

The distributed denial of service (DDoS) attack is detrimental to the in...
03/23/2021

Detecting Phishing Sites – An Overview

Phishing is one of the most severe cyber-attacks where researchers are i...
02/03/2022

VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT

Personalized IoT adapts their behavior based on contextual information, ...