INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 46    Submit Your Rating     Cite This   Download        Certificate

A LITERATURE REVIEW OF PHISHING ASSAULTS AND RECOGNITION OF ANTI PHISHING APPROACHES

    4 Author(s):  SARANYA MUKUNADAN C,MUHSINA TM,SHAHANAS K,DR. RASMI A

Vol -  12, Issue- 1 ,         Page(s) : 102 - 113  (2022 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Phishingisacybercrimethatusestacticstocollectpersonal information using deceptive emails and websites.Phishingattacksarepracticeofsendingfraudulentcommu-nications that appear to be from a reputable source.The goalistostealsensitivedatalikeMasterCard and login informa-tion or to put in malware on the victim’s machine.In thispaper we discuss about phishing, differing kinds of phish-ing attacks, a number of the anti-phishing approaches. Thispaperaimsatraisingawarenessofdifferentphishingstrate-

Ramanathan and H. Wechsler. Phishgillnet- phishing detection methodology using probabilis- tic latent semantic analysis, adaboost, and co- training. EURASIP J. Info. Secur, 1(2):1–22, 2012. doi:10.1186/1687-417X-2012-1.
N. A. G. Arachchilage and S. Love. Security aware- ness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav., 38:304–312, 2014. doi:doi:10.1016/j.chb.2014.05.046.
M. Jakobsson and S. Myers. Phishing and coun- termeasures: understanding the increasing prob- lems of electronic   identity   theft.   New   Jer- sey: John Wiley and Sons., 38:304–312, 2006. doi:doi:10.1016/j.chb.2014.05.046.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details