A survey of phishing attacks: Their types, vectors and technical approaches
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehen...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier Ltd
2018
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx http://ir.unimas.my/id/eprint/20363/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sarawak |
Language: | English |
id |
my.unimas.ir.20363 |
---|---|
record_format |
eprints |
spelling |
my.unimas.ir.203632022-09-29T02:39:01Z http://ir.unimas.my/id/eprint/20363/ A survey of phishing attacks: Their types, vectors and technical approaches Chiew, Kang Leng Yong, Kelvin Sheng Chek Tan, Choon Lin QA75 Electronic computers. Computer science Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehensive and easy-to-follow review of these approaches is presented here. The relevant mediums and vectors of these approaches are identified for each approach. The medium is the platform which the approaches reside and the vector is the means of propagation utilised by the phisher to deploy the attack. The paper focuses primarily on the detailed discussion of these approaches. The combination of these approaches that the phishers utilised in conducting their phishing attacks is also discussed. This review will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system. This review creates awareness of these phishing techniques and encourages the practice of phishing prevention among the readers. Furthermore, this review will gear the research direction through the types of phishing, while also allowing the identification of areas where the anti-phishing effort is lacking. This review will benefit not only the developers of anti-phishing techniques but the policy makers as well. © 2018 Elsevier Ltd Elsevier Ltd 2018-09-15 Article PeerReviewed text en http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx Chiew, Kang Leng and Yong, Kelvin Sheng Chek and Tan, Choon Lin (2018) A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106. pp. 1-20. ISSN 0957-4174 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429 DOI: 10.1016/j.eswa.2018.03.050 |
institution |
Universiti Malaysia Sarawak |
building |
Centre for Academic Information Services (CAIS) |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sarawak |
content_source |
UNIMAS Institutional Repository |
url_provider |
http://ir.unimas.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Chiew, Kang Leng Yong, Kelvin Sheng Chek Tan, Choon Lin A survey of phishing attacks: Their types, vectors and technical approaches |
description |
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehensive and easy-to-follow review of these approaches is presented here. The relevant mediums and vectors of these approaches are identified for each approach. The medium is the platform which the approaches reside and the vector is the means of propagation utilised by the phisher to deploy the attack. The paper focuses primarily on the detailed discussion of these approaches. The combination of these approaches that the phishers utilised in conducting their phishing attacks is also discussed. This review will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system. This review creates awareness of these phishing techniques and encourages the practice of phishing prevention among the readers. Furthermore, this review will gear the research direction through the types of phishing, while also allowing the identification of areas where the anti-phishing effort is lacking. This review will benefit not only the developers of anti-phishing techniques but the policy makers as well. © 2018 Elsevier Ltd |
format |
Article |
author |
Chiew, Kang Leng Yong, Kelvin Sheng Chek Tan, Choon Lin |
author_facet |
Chiew, Kang Leng Yong, Kelvin Sheng Chek Tan, Choon Lin |
author_sort |
Chiew, Kang Leng |
title |
A survey of phishing attacks: Their types, vectors and technical approaches |
title_short |
A survey of phishing attacks: Their types, vectors and technical approaches |
title_full |
A survey of phishing attacks: Their types, vectors and technical approaches |
title_fullStr |
A survey of phishing attacks: Their types, vectors and technical approaches |
title_full_unstemmed |
A survey of phishing attacks: Their types, vectors and technical approaches |
title_sort |
survey of phishing attacks: their types, vectors and technical approaches |
publisher |
Elsevier Ltd |
publishDate |
2018 |
url |
http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx http://ir.unimas.my/id/eprint/20363/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429 |
_version_ |
1745566038668345344 |