A brief review of phishing
DOI:
https://doi.org/10.5902/2448190471731Keywords:
Phishing, Phishing Detection, Social Engineering, Information SecurityAbstract
The number of phishing attacks reached in 2021 the highest number of all time until then, being the triple since 2020. This event demonstrates that as phishing techniques are shaped considering the context of their target since its emergence in 1995, these attacks end up adapting over time and, thus, this problem persists in society for more than 25 years and continues to increase its number of victims. With that, this work presents a study about what is phishing, its concepts, its types and the problems caused in society.
Downloads
References
Abroshan, H., Devos, J., Poels, G., and Laermans, E. (2021). Covid-19 and phishing:
Effects of human emotions, behavior, and demographics on the success of phishing
attempts during the pandemic. IEEE Access, 9:121916–121929.
Aleroud, A. and Zhou, L. (2017). Phishing environments, techniques, and countermeasu-
res: A survey. Computers Security, 68:160–196.
Almeida, R. A. O. C. B. d. (2022). Heuristic phishing detection based on web cra-
wling and user behaviour monitoring with a deterministic approach for cybersecurity.
PPGCC UFSC.
APWG (2021). Phishing activity trends report 4th quarter 2021. In PHISHING ACTIVITY
TRENDS REPORT 4th Quarter 2021. apwg.org.
Basit, A. e. a. (2021). A comprehensive survey of ai-enabled phishing attacks detection
techniques. Telecommunication Systems.
Chiew, K. L., Yong, K. S. C., and Tan, C. L. (2018). A survey of phishing attacks: Their
types, vectors and technical approaches. Expert Systems with Applications, 106:1–20.
Desolda, G., Ferro, L. S., Marrella, A., Catarci, T., and Costabile, M. F. (2021). Human
factors in phishing attacks: A systematic literature review. 54(8).
Hatfield, J. M. (2018). Social engineering in cybersecurity: The evolution of a concept.
Computers Security, 73:102–113.
James, L. (2006). Chapter 1 - banking on phishing. In James, L., editor, Phishing Exposed,
pages 1–35. Syngress, Burlington.
Sahingoz, O. K., Buber, E., Demir, O., and Diri, B. (2019). Machine learning based
phishing detection from urls. Expert Systems with Applications, 117:345–357.
Syafitri, W., Shukur, Z., Mokhtar, U. A., Sulaiman, R., and Ibrahim, M. A. (2022).
Social engineering attacks prevention: A systematic literature review. IEEE Access,
:39325–39343.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Revista ComInG - Communications and Innovations Gazette
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Os manuscritos aceitos e publicados são de propriedade da revista ComInG.
Os originais deverão ser acompanhados de documentos de transferência de direitos autorais contendo assinatura dos autores.
A carta de direitos autorais deve ser enviada para o e-mail coming@inf.ufsm.br
É vedada a submissão integral ou parcial do manuscrito a qualquer outro periódico. A responsabilidade do conteúdo dos artigos é exclusiva dos autores.
É vedada a tradução para outro idioma sem a autorização escrita do Editor ouvida a Comissão Editorial.
ENGLISH
Manuscripts accepted and published are the property of the journal ComInG.
The originals must be accompanied by documentation of copyright transfer containing the signature of the authors.
You may not submit full or partial manuscript to another journal. The responsibility of the article's content is exclusive of the authors.
You may not translating into another language without the written permission of the Editor after consultation with the Editorial Board.