Phishing Mitigation Techniques: A Literature Survey

04/14/2021
by   Nmachi Peace Wosah, et al.
0

Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an exploration into how phishing detection can be improved.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/13/2020

An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques

Wireless Sensor Network (WSN) is the network of the future. As it gradua...
research
08/16/2018

Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network

Distributed denial of service (DDoS) attacks are a constant threat for s...
research
10/22/2020

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

Due to recent world events, video calls have become the new norm for bot...
research
03/11/2021

The Curse of Correlations for Robust Fingerprinting of Relational Databases

Database fingerprinting schemes have been widely adopted to prevent unau...
research
12/11/2020

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT

The distributed denial of service (DDoS) attack is detrimental to the in...
research
11/08/2021

Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing

Multi-access Edge Computing (MEC) is a 5G-enabling solution that aims to...

Please sign up or login with your details

Forgot password? Click here to reset