Tutorial and critical analysis of phishing websites methods

dc.contributor.author Mohammad, Rami M.
dc.contributor.author Thabtah, Fadi
dc.contributor.author McCluskey, Lee
dc.date.accessioned 2021-03-24T07:13:30Z
dc.date.available 2021-03-24T07:13:30Z
dc.date.copyright © 2015
dc.date.issued 2015-08-01
dc.description This review is not available at CUD collection. The version of scholarly record of this review is published in Computer Science Review (2015), available online at: https://doi.org/10.1016/j.cosrev.2015.04.001 en_US
dc.description.abstract The Internet has become an essential component of our everyday social and financial activities. Internet is not important for individual users only but also for organizations, because organizations that offer online trading can achieve a competitive edge by serving worldwide clients. Internet facilitates reaching customers all over the globe without any market place restrictions and with effective use of e-commerce. As a result, the number of customers who rely on the Internet to perform procurements is increasing dramatically. Hundreds of millions of dollars are transferred through the Internet every day. This amount of money was tempting the fraudsters to carry out their fraudulent operations. Hence, Internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customers' confidence in e-commerce and online banking. Therefore, suitability of the Internet for commercial transactions becomes doubtful. Phishing is considered a form of web threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain user's confidential credentials such as usernames, passwords and social security numbers. In this article, the phishing phenomena will be discussed in detail. In addition, we present a survey of the state of the art research on such attack. Moreover, we aim to recognize the up-to-date developments in phishing and its precautionary measures and provide a comprehensive study and evaluation of these researches to realize the gap that is still predominating in this area. This research will mostly focus on the web based phishing detection methods rather than email based detection methods. © 2015 Elsevier Inc. en_US
dc.identifier.citation Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Tutorial and critical analysis of phishing websites methods. Computer Science Review, 17, 1–24. http://dx.doi.org/10.1016/j.cosrev.2015.04.001 en_US
dc.identifier.issn 15740137
dc.identifier.uri http://dx.doi.org/10.1016/j.cosrev.2015.04.001
dc.identifier.uri http://hdl.handle.net/20.500.12519/359
dc.language.iso en en_US
dc.publisher Elsevier Ireland Ltd en_US
dc.relation Authors Affiliations : Mohammad, R.M., School of Computing and Engineering, University of Huddersfield, Huddersfield, United Kingdom; Thabtah, F., E-Business Department, Canadian University of Dubai, Dubai, United Arab Emirates; McCluskey, L., School of Computing and Engineering, University of Huddersfield, Huddersfield, United Kingdom
dc.relation.ispartofseries Computer Science Review; Volume 17
dc.rights License to reuse the abstract has been secured from Elsevier and Copyright Clearance Center.
dc.rights.holder Copyright : © 2015 Elsevier Inc.
dc.rights.uri https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=9413fac0-9c11-43a4-9dea-941f6601457b
dc.subject Commerce en_US
dc.subject Data mining en_US
dc.subject Electronic commerce en_US
dc.subject Information dissemination en_US
dc.subject Internet en_US
dc.subject Sales en_US
dc.subject Social networking (online) en_US
dc.subject Websites en_US
dc.subject Anti-phishing en_US
dc.subject Blacklist en_US
dc.subject Commercial transactions en_US
dc.subject Phishing en_US
dc.subject Precautionary measures en_US
dc.subject Private information en_US
dc.subject Social security numbers en_US
dc.subject Whitelist en_US
dc.subject Computer crime en_US
dc.title Tutorial and critical analysis of phishing websites methods en_US
dc.type Review en_US
Files
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.01 KB
Format:
Item-specific license agreed upon to submission
Description: