A survey of phishing attacks: Their types, vectors and technical approaches

Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehen...

Full description

Saved in:
Bibliographic Details
Main Authors: Chiew, Kang Leng, Yong, Kelvin Sheng Chek, Tan, Choon Lin
Format: Article
Language:English
Published: Elsevier Ltd 2018
Subjects:
Online Access:http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx
http://ir.unimas.my/id/eprint/20363/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Sarawak
Language: English
id my.unimas.ir.20363
record_format eprints
spelling my.unimas.ir.203632022-09-29T02:39:01Z http://ir.unimas.my/id/eprint/20363/ A survey of phishing attacks: Their types, vectors and technical approaches Chiew, Kang Leng Yong, Kelvin Sheng Chek Tan, Choon Lin QA75 Electronic computers. Computer science Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehensive and easy-to-follow review of these approaches is presented here. The relevant mediums and vectors of these approaches are identified for each approach. The medium is the platform which the approaches reside and the vector is the means of propagation utilised by the phisher to deploy the attack. The paper focuses primarily on the detailed discussion of these approaches. The combination of these approaches that the phishers utilised in conducting their phishing attacks is also discussed. This review will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system. This review creates awareness of these phishing techniques and encourages the practice of phishing prevention among the readers. Furthermore, this review will gear the research direction through the types of phishing, while also allowing the identification of areas where the anti-phishing effort is lacking. This review will benefit not only the developers of anti-phishing techniques but the policy makers as well. © 2018 Elsevier Ltd Elsevier Ltd 2018-09-15 Article PeerReviewed text en http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx Chiew, Kang Leng and Yong, Kelvin Sheng Chek and Tan, Choon Lin (2018) A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106. pp. 1-20. ISSN 0957-4174 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429 DOI: 10.1016/j.eswa.2018.03.050
institution Universiti Malaysia Sarawak
building Centre for Academic Information Services (CAIS)
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sarawak
content_source UNIMAS Institutional Repository
url_provider http://ir.unimas.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Chiew, Kang Leng
Yong, Kelvin Sheng Chek
Tan, Choon Lin
A survey of phishing attacks: Their types, vectors and technical approaches
description Phishing was a threat in the cyber world a couple of decades ago and still is today. It has grown and evolved over the years as phishers are getting creative in planning and executing the attacks. Thus, there is a need for a review of the past and current phishing approaches. A systematic, comprehensive and easy-to-follow review of these approaches is presented here. The relevant mediums and vectors of these approaches are identified for each approach. The medium is the platform which the approaches reside and the vector is the means of propagation utilised by the phisher to deploy the attack. The paper focuses primarily on the detailed discussion of these approaches. The combination of these approaches that the phishers utilised in conducting their phishing attacks is also discussed. This review will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system. This review creates awareness of these phishing techniques and encourages the practice of phishing prevention among the readers. Furthermore, this review will gear the research direction through the types of phishing, while also allowing the identification of areas where the anti-phishing effort is lacking. This review will benefit not only the developers of anti-phishing techniques but the policy makers as well. © 2018 Elsevier Ltd
format Article
author Chiew, Kang Leng
Yong, Kelvin Sheng Chek
Tan, Choon Lin
author_facet Chiew, Kang Leng
Yong, Kelvin Sheng Chek
Tan, Choon Lin
author_sort Chiew, Kang Leng
title A survey of phishing attacks: Their types, vectors and technical approaches
title_short A survey of phishing attacks: Their types, vectors and technical approaches
title_full A survey of phishing attacks: Their types, vectors and technical approaches
title_fullStr A survey of phishing attacks: Their types, vectors and technical approaches
title_full_unstemmed A survey of phishing attacks: Their types, vectors and technical approaches
title_sort survey of phishing attacks: their types, vectors and technical approaches
publisher Elsevier Ltd
publishDate 2018
url http://ir.unimas.my/id/eprint/20363/1/A%20survey%20of%20phishing.docx
http://ir.unimas.my/id/eprint/20363/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045284469&doi=10.1016%2fj.eswa.2018.03.050&partnerID=40&md5=bfdc743510a3dfb4f444db956ce81429
_version_ 1745566038668345344