Abstract

Phishing, a criminal act of collecting personal, bank and credit card information by sending out forged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are constantly on the rise. The impact of phishing is quite drastic since it involves the threat of identity theft and financial losses. A lot of groups and organizations are trying to study this act and also inform and update the public on what are the latest tactics being used in the phishing sector. According to industry estimates, phishing attacks are on the rise every year and the existing anti phishing solutions fall short in detecting phishing. Moreover, phishers come up with innovative methods of phishing everyday making it even more difficult to detect and prevent phishing. This paper explains in detail the various methods used in phishing. We perform a root-cause analysis of the methods used in phishing, the motivation for phishing and in the process come up with a fishbone diagram outlining the causes and methodologies used in phishing. This analysis is aimed at helping developers to design and develop better anti phishing solutions.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.