Defending against phishing attacks: taxonomy of methods, current issues and future directions
B. B. Gupta (),
Nalin A. G. Arachchilage () and
Kostas E. Psannis ()
Additional contact information
B. B. Gupta: National Institute of Technology Kurukshetra
Nalin A. G. Arachchilage: The University of New South Wales
Kostas E. Psannis: University of Macedonia
Telecommunication Systems: Modelling, Analysis, Design and Management, 2018, vol. 67, issue 2, No 8, 247-267
Abstract:
Abstract Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-user awareness in phishing threat prevention. Therefore, aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers’ motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats.
Keywords: Phishing; Security; Malware; Social engineering; Spam; Visual similarity; Data mining; Machine learning (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations: View citations in EconPapers (8)
Downloads: (external link)
http://link.springer.com/10.1007/s11235-017-0334-z Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:67:y:2018:i:2:d:10.1007_s11235-017-0334-z
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-017-0334-z
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().