Phishing Attacks and Counter Measures
Sophia Kingsley Okore, Benisemeni Zakka"Phishing Attacks and Counter Measures". International Journal of Computer Trends and Technology (IJCTT) V25(1):23-28, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Phishing is a term used to describe various scams that
use fraudulent e-mail messages, sent by criminals, to trick
people into exposing personal information. The criminals
use this information identity to rob bank account, or take
over computers. Counterfeit web sites, using “hijacked”
company brands and logos are created to lure individuals
into revealing information that are confidential. These
digital thugs are “phishing” for any data they can obtain to
prey on people and further their criminal activities.
E-mail has become an invaluable communication tool,
both for business and personal use. Among the many
security issues that affect computer users, there is a rapidly
growing threat known as “phishing”. Criminals use
phishing attacks to lure the unsuspecting into visiting a
fraudulent web site, calling a fraudulent phone number, or
downloading malicious software, expressly to steal sensitive
information such as credit card numbers, account
credentials, social security numbers, PINS, or passwords.
Phishing e-mails are only a small aspect of the overall
phishing economy and up till now, the only aspect seen by
most people. The phishing economy is decentralized and
self- organized social network of merchants and consumers
governed by laws of demand and supply.
References
[1] http://www.forbes.com/2007/12/27/phishing-hacking-virustech-
security-cx_ag_1228phish.html
[2] Anti-Phishing Working Group. Phishing Activity Trends Report
November 2005 (2005).
[3] Anti-Phishing Working Group Phishing Archive. http://antihishing.
org/phishing_archive.htm
[4] Why Phishing Works: Rachna Dhamija, Conference on Human
Factors in Computing Systems, April 2006
[5] Phishing: An Analysis of a Growing Problem, Anthony Elledge.
SANS Institute InfoSec Reading Room January 2007
[6] The Evolution of Phishing Attacks: Kasperskey Lab 2011-2013
[7] A framework for detection and measurement of phishing
attacks, Chou et al. 2004, Sujata Garera et al.
[8] Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why Phishing
Works. Proceedings of the SIGCHI Conference on Human Factors
in Computing Systems, Canada, pp. 581-590. Retrieved October 29,
2007, from ACM Digital Library.
[9] Berghel, H., Carpinter, J., & Jo, J.-Y. (2007). Phish Phactors:
Offensive and Defensive Strategies. Advances in Computers, 70,
223-268. Retrieved November 3, 2007, from Web of Science
database
[10] Camenisch, J., Shelat, A., Sommer, D., & Zimmerman, R.
(2006). Securing User Inputs for the Web. Proceedings of the
Second ACM Workshop on Digital Identity Management, USA, pp.
33-44. Retrieved October 28, 2007, from ACM Digital Library.
[11] Wu, M., Miller, R. C., & Garfinkel, S. L. (2006). Do Security
Toolbars Actually Prevent Phishing Attacks? Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems,
Canada, pp. 601-610. Retrieved October 28, 2007, from ACM
Digital Library.
[12] Milletary, J. (2005). Technical Trends in Phishing Attacks.
Retrieved December 1, 2007, from http://www.uscert.
gov/reading_room/phishing_trends0511.pdf
[13] Anti-Phishing Working Group. (2007). What is Phishing and
Pharming? Retrieved December 1, 2007, from
http://www.antiphishing.org/DOJ_Special_Report_On_Phishing_M
ar04.pdf
[14] Web Identity Security: Advanced Phishing Attacks And Counter
Measures, Anthony Yingjie Fu City University Of Hong Kong
September 2006
[15] Enhancing Home Computer User Information Security:
Factors to Consider in the Design of Anti-phishing Applications,
Melinda Geist ,Intel Corporation Febuary 2008
[16] International Journal of Advanced Research in Computer
Science and Software Engineering Jyoti et al.3(5), May - 2013, pp.
458-465
[17] Jakobsson, M. (2007). The Human Factor in Phishing.
Retrieved November 21, 2007, from Indiana University, School of
Informatics Web site:
http://www.informatics.indiana.edu/markus/papers/aci.pdf
[18] Techniques on Phishing and Counter measures Muhammad
Khalil and Marcus Wolffl Fall 2008
Keywords
phishing,