Analysis and Prevention of Phishing Attacks in Cyber Space

Now-a-days internet become a very unsafe space to deal with. Hackers are constantly trying to gain the user’s personal information, and detailed credentials. So many websites on the internet, even though safe, this safety cannot be assured by all websites. These rule breakers avoid abiding by rules, and try to employ methods like trickery and hacking to gain illegal access to private information. To be able to overcome this problem, we need to first understand the intricacies of how the virus is designed. This paper mainly deals with the analysis of phishing attacks in the cyberspace and any malicious content that is associated with the web, and is carried out within the browser. The files which are downloaded with virus, and involve third party applications from the PC, cannot be checked for virus. For instance, if there is a word file that is downloaded to the PC, it uses apps outside the web in the VM, and hence cannot be controlled by the VM.

[1]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[2]  Gaurav,et al.  Anti-Phishing Techniques : A Review , 2022 .

[3]  Huajun Huang,et al.  Browser-Side Countermeasures for Deceptive Phishing Attack , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[4]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[5]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[6]  Jason Hong,et al.  The state of phishing attacks , 2012, Commun. ACM.

[7]  Christopher Krügel,et al.  Protecting Users against Phishing Attacks , 2006, Comput. J..

[8]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[9]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[10]  Lorrie Faith Cranor,et al.  An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.

[11]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[12]  Bimal Parmar,et al.  Protecting against spear-phishing , 2012 .

[13]  Ponnurangam Kumaraguru,et al.  Emerging phishing trends and effectiveness of the anti-phishing landing page , 2014, 2014 APWG Symposium on Electronic Crime Research (eCrime).

[14]  Dan Boneh,et al.  Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.

[15]  Xiaotie Deng,et al.  Detection of phishing webpages based on visual similarity , 2005, WWW '05.

[16]  Eric Medvet,et al.  Visual-similarity-based phishing detection , 2008, SecureComm.

[17]  Lorrie Faith Cranor,et al.  Lessons from a real world evaluation of anti-phishing training , 2008, 2008 eCrime Researchers Summit.

[18]  Junshan Tan,et al.  Countermeasure Techniques for Deceptive Phishing Attack , 2009, 2009 International Conference on New Trends in Information and Service Science.

[19]  Adrian Perrig,et al.  Phoolproof Phishing Prevention , 2006, Financial Cryptography.

[20]  Niels Provos,et al.  A framework for detection and measurement of phishing attacks , 2007, WORM '07.

[21]  Nasir D. Memon,et al.  Phishing, Personality Traits and Facebook , 2013, ArXiv.

[22]  Anthony Skjellum,et al.  High-performance content-based phishing attack detection , 2011, 2011 eCrime Researchers Summit.

[23]  Murray S. Kucherawy DomainKeys Identified Mail (DKIM) and Mailing Lists , 2011, RFC.