COMMENTS

  1. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

    Research on social media-based phishing, Voice Phishing, and SMS Phishing is sparse and these emerging threats are predicted to be significantly increased over the next years. 3. Laws and legislations that apply for phishing are still at their infant stage, in fact, there are no specific phishing laws in many countries. Most of the phishing ...

  2. A systematic literature review on phishing website ...

    3. Methodology. The systematic literature review is a research process that follows a set of rules. The paper follows the methodology introduced by Singh & Kaur (Singh and Kaur, 2018), Singh et al. (Singh and Beniwal, 2021), Kitchenham et al. (Kitchenham et al., 2010), and Brereton et al. (Brereton et al., 2007).The review methodology includes constructing research questions, identifying the ...

  3. Mitigation strategies against the phishing attacks: A systematic

    The paper presents the outcomes of SLR conducted while focusing on four research questions. The paper advocates that technology-only solutions are never going to be enough to protect against attacks targeted toward human users, therefore, there is a need to consider the role and abilities of human users in the development of anti-phishing ...

  4. How Good Are We at Detecting a Phishing Attack? Investigating the

    These phishing attacks come in the form of a request, urgent, important, seeking attention and often requiring some form of payment . According to research some industries are more targeted than others, for example, public administration services had the most breaches from social engineering, followed by other professional services .

  5. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

    Phishing is an example of a highly. effective form of cybercrime that enables criminals to deceive users and steal important. data. Since the first reported phishing attack in 1990, it has been ...

  6. A systematic review and research challenges on phishing ...

    Phishing is one of the most important security threats in modern information systems causing different levels of damages to end-users and service providers such as financial and reputational losses. State-of-the-art anti-phishing research is highly fragmented and monolithic and does not address the problem from a pervasive computing perspective. In this survey, we aim to contribute to the ...

  7. An effective detection approach for phishing websites using URL and

    This paper proposed a novel anti-phishing approach, which involves different features (URL, hyperlink, and text) that have never been taken into consideration. The proposed approach is a ...

  8. Human Factors in Phishing Attacks: A Systematic Literature Review

    Abstract. Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. It is a type of cyber attack often successful because users are not aware of their vulnerabilities or are unable to understand the risks. This article presents a systematic literature review ...

  9. How Good Are We at Detecting a Phishing Attack ...

    In this paper, we are interested in how the phishing email attack has evolved to this very threatening state. In detail, we explore the current phishing attack characteristics especially the growing challenges that have emerged as a result of the COVID-19 pandemic. ... Research by Symantec shows that throughout 2020, 1 in every 4200 emails was ...

  10. Applications of deep learning for phishing detection: a systematic

    The papers that address more general problems, such as spam email detection, authorship identification, domain name classification, bot detection in social networks, malware detection, were excluded unless they explicitly included an application of a DL algorithm to phishing detection. While the papers that used both DL and traditional ML ...

  11. A comprehensive survey of AI-enabled phishing attacks detection

    This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

  12. [2104.01255] A Systematic Literature Review on Phishing and Anti

    Phishing is the number one threat in the world of internet. Phishing attacks are from decades and with each passing year it is becoming a major problem for internet users as attackers are coming with unique and creative ideas to breach the security. In this paper, different types of phishing and anti-phishing techniques are presented. For this purpose, the Systematic Literature Review(SLR ...

  13. A Systematic Review on Deep-Learning-Based Phishing Email Detection

    1. This systematic literature review aims to provide a comprehensive overview of the current state of research on the use of deep learning techniques for phishing detection. 2. The review explores the various deep learning techniques used for phishing detection, their effectiveness, and areas for future research. 3.

  14. (PDF) Phishing

    Phishing is a major threat to all Internet users and is difficult to trace or. defend against since it does not present itself as obviously malicious in nature. In today's society, everything is ...

  15. A Systematic Literature Review on Phishing and Anti-Phishing Techniques

    research revealed that from all the phishing techniques spear phishing is most targeted form of phishing. Athulya et al. [29] discussed the different phishing attacks, latest phishing techniques used by the phishers and highlighted some anti-phishing approaches. The paper raises awareness about phishing attacks and strategies and urge the ...

  16. Detecting Phishing Domains Using Machine Learning

    Phishing is an online threat where an attacker impersonates an authentic and trustworthy organization to obtain sensitive information from a victim. One example of such is trolling, which has long been considered a problem. However, recent advances in phishing detection, such as machine learning-based methods, have assisted in combatting these attacks. Therefore, this paper develops and ...

  17. The COVID‐19 scamdemic: A survey of phishing attacks and their

    The paper also showed the latest research contributions of cybersecurity during COVID‐19, in the form of a literature review corroborated by examples of how Google and Microsoft managed their privacy and cybersecurity, as well as the deriving limitations. ... That is, the landscape of research on COVID‐19 phishing attacks and their ...

  18. [2404.18416] Capabilities of Gemini Models in Medicine

    Excellence in a wide variety of medical applications poses considerable challenges for AI, requiring advanced reasoning, access to up-to-date medical knowledge and understanding of complex multimodal data. Gemini models, with strong general capabilities in multimodal and long-context reasoning, offer exciting possibilities in medicine. Building on these core strengths of Gemini, we introduce ...

  19. A comprehensive survey of AI-enabled phishing attacks detection

    In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online ...

  20. Risk Sharing and Amplification in the Global Banking Network

    This paper analyzes the role of global banking linkages in sharing risk and amplifying shocks, both across countries and over time. It studies whether banks or firms from some countries receive more credit in response to local shocks or experience greater amplification of foreign shocks. It also looks at how banks' role has evolved since the ...

  21. An intelligent cyber security phishing detection system ...

    Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this threat, this paper proposes to give a complete vision to what Machine learning is, what phishers are using to trick gullible users with different types of phishing attacks techniques and based on our survey that phishing ...

  22. Scientists increasingly using AI to write research papers

    Two academic papers assert that analyzing word choice in the corpus of science publications reveals an increasing usage of AI for writing research papers. One study, published in March by Andrew Gray of University College London in the UK, suggests one percent of all papers published in 2023 were written at least partially by AI.

  23. The development of phishing during the COVID-19 pandemic: An analysis

    On the other hand, this paper shows that phishing scheme adoption is commonly observed, and seems preferable to novel scheme development. This paper further reflects on this adaption choice by attackers from multiple theory perspectives to explain this behavior. The rest of this paper is organized as follows. Section 2 reviews the related work.

  24. Bird flu likely circulated in US cows for four months before diagnosis

    Members of USDA's network of laboratories that monitors for diseases identified influenza A virus, which includes bird flu, in milk and nasal swabs from cows at a Texas dairy, the paper said ...

  25. Detecting phishing websites using machine learning technique

    2. Research background and related works. Phishing attacks are categorized according to Phisher's mechanism for trapping alleged users. Several forms of these attacks are keyloggers, DNS toxicity, Etc., [].The initiation processes in social engineering include online blogs, short message services (SMS), social media platforms that use web 2.0 services, such as Facebook and Twitter, file ...

  26. Intelligent phishing website detection using machine learning

    The contributions of the paper are as follows, Create a machine learning model using the logistic regression classifier. Train the model to identify and differentiate a malicious website/ URL from a safe URL. Create a webapp that runs on a server for identifying phishing websites based on the model trained.