Anti Phishing Attack Analysis

1443 Words6 Pages

Analysis of Phishing Attacks and Anti-Phishing Techniques

Ruta Pravin Utture
Information Science and Engineering
PES Institute of Technology, Bangalore South Campus rutautture97@gmail.com Abstract—Phishing is the attempt to obtain sensitive information often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Whether it's getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form of communication they can to steal valuable data. Implementation of security measures in these communication devices against phishing is the need of the hour for our tech savvy generation. This paper studies, analyzes, and classifies the …show more content…

ANTI-PHISHING APPROACHES
The anti-phishing solutions are based on its applications and approaches level. In anti-phishing literature, the most of existing approaches are based on detection techniques. These approaches are categorized into different types such as some are based on lists, hybrid, and information flow.
In list type approaches contains blacklists and whitelists approaches and rely on regularly updated lists of well-known phishing and legitimate URLS. These are widely used and achieve high detection accuracy with low false positive rates. However, these approaches are cannot detect and identify fresh phishes because of lists, where maintenance and human resources required and the scalability and run time are not suitable. This is the reason the list based approaches combine with other approaches.
The Heuristics based approaches are predicted through one or more websites features like URL, source code and visual features. These two types list and heuristic approaches can work against fresh phishes and produce low detection accuracy. Because of these reasons the researchers proposed hybrid …show more content…

This is the main reason the phishers cannot identify real credentials. However, these approaches fail when phishing websites allow limited number of random credentials to be submitted. The application level approaches have been roughly categorized into client side, server side and client and server level. Most of approaches are on client side level in the shape of tools in popular browsers such as Mozilla Firefox, Internet Explorer and Google Chrome, etc. These integrated tools keep user activities and track during web browsing and inform them in time about phishing websites. These approaches are suffered from some short comes like design of intuitive interface, correct warnings, help system and detection accuracy. The existing client side approaches are deployed for active notification and risk of interrupt browsing process. These notifications are not acceptable in the case of misclassifying legitimate websites as phishing websites, which may decrease user trust and reliability on anti-phishing tools and on web browser. Although server side solutions are effective but there is another problem in server-side anti-phishing solutions and that is not effective against web banners and fail when users rarely notice the absence and existence of these indications. The most of commercial organizations are using client-server structured

More about Anti Phishing Attack Analysis

Open Document