An overview of phishing attacks and their detection techniques
by Mehdi Dadkhah; Mohammad Davarpanah Jazi; Majid Saidi Mobarakeh; Shahaboddin Shamshirband; Xiaojun Wang; Sachin Raste
International Journal of Internet Protocol Technology (IJIPT), Vol. 9, No. 4, 2016

Abstract: With rapid spread of the internet and cyber space, it has gained numerous applications and has been used as a powerful tool for social collaborations, communications and trades. The internet has superior performance to the traditional ways, as well as many useful features. This has been a reason for its growing usage in online trade and emergence of electronic commerce (e-commerce). Security is an essential requirement in electronic interactions. In this context, phishing attacks are among the most important challenges e-commerce is faced with. On the other hand, it is one of the mostly used methods for password stealing. In phishing attacks, the attacker redirects the victim to their fake web pages in order to steal their sensitive information such as passwords. Numerous methods have been devised to defeat such attacks. Web pages, e-mails and URLs used for phishing attacks have some features which can be used to identify fake pages. In this article, we try to introduce different types of phishing attacks and possible detection techniques for them, then discuss about advantages and disadvantages of each technique. Finally, we state that which anti phishing techniques can be used for detection of each phishing types.

Online publication date: Wed, 04-Jan-2017

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Protocol Technology (IJIPT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com