Preventive Techniques of Phishing Attacks in Networks

M. Adil, Rahim Khan, M. Ghani
{"title":"Preventive Techniques of Phishing Attacks in Networks","authors":"M. Adil, Rahim Khan, M. Ghani","doi":"10.1109/ICACS47775.2020.9055943","DOIUrl":null,"url":null,"abstract":"Internet is the most widely used technology in the current era of information technology and it is embedded in daily life activities. Due to its extensive use in everyday life, it has many applications such as social media (Face book, WhatsApp, messenger etc.,) and other online applications such as online businesses, e-counseling, advertisement on websites, e-banking, e-hunting websites, e-doctor appointment and e-doctor opinion. The above mentioned applications of internet technology makes things very easy and accessible for human being in limited time, however, this technology is vulnerable to various security threats. A vital and severe threat associated with this technology or a particular application is “Phishing attack” which is used by attacker to usurp the network security. Phishing attacks includes fake E-mails, fake websites, fake applications which are used to steal their credentials or usurp their security. In this paper, a detailed overview of various phishing attacks, specifically their background knowledge, and solutions proposed in literature to address these issues using various techniques such as anti-phishing, honey pots and firewalls etc. Moreover, installation of intrusion detection systems (IDS) and intrusion detection and prevention system (IPS) in the networks to allow the authentic traffic in an operational network. In this work, we have conducted end use awareness campaign to educate and train the employs in order to minimize the occurrence probability of these attacks. The result analysis observed for this survey was quite excellent by means of its effectiveness to address the aforementioned issues.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACS47775.2020.9055943","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Internet is the most widely used technology in the current era of information technology and it is embedded in daily life activities. Due to its extensive use in everyday life, it has many applications such as social media (Face book, WhatsApp, messenger etc.,) and other online applications such as online businesses, e-counseling, advertisement on websites, e-banking, e-hunting websites, e-doctor appointment and e-doctor opinion. The above mentioned applications of internet technology makes things very easy and accessible for human being in limited time, however, this technology is vulnerable to various security threats. A vital and severe threat associated with this technology or a particular application is “Phishing attack” which is used by attacker to usurp the network security. Phishing attacks includes fake E-mails, fake websites, fake applications which are used to steal their credentials or usurp their security. In this paper, a detailed overview of various phishing attacks, specifically their background knowledge, and solutions proposed in literature to address these issues using various techniques such as anti-phishing, honey pots and firewalls etc. Moreover, installation of intrusion detection systems (IDS) and intrusion detection and prevention system (IPS) in the networks to allow the authentic traffic in an operational network. In this work, we have conducted end use awareness campaign to educate and train the employs in order to minimize the occurrence probability of these attacks. The result analysis observed for this survey was quite excellent by means of its effectiveness to address the aforementioned issues.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络钓鱼攻击的防范技术
互联网是当今信息技术时代应用最广泛的技术,它已经深入到人们的日常生活活动中。由于它在日常生活中的广泛使用,它有许多应用,如社交媒体(facebook, WhatsApp, messenger等)和其他在线应用,如网上商务,电子咨询,网站广告,电子银行,电子狩猎网站,电子医生预约和电子医生意见。互联网技术的上述应用使人们在有限的时间内可以很容易地接触到事物,然而,这项技术容易受到各种安全威胁。与该技术或特定应用相关的一个重要而严重的威胁是“网络钓鱼攻击”,攻击者利用它来篡夺网络安全。网络钓鱼攻击包括假电子邮件、假网站、假应用程序,用来窃取他们的凭据或篡夺他们的安全。在本文中,详细概述了各种网络钓鱼攻击,特别是他们的背景知识,以及在文献中提出的解决方案,以解决这些问题,使用各种技术,如反网络钓鱼,蜜罐和防火墙等。此外,在网络中安装入侵检测系统(IDS)和入侵检测与防御系统(IPS),使真实的流量能够在网络中正常运行。在这项工作中,我们开展了终端用户意识宣传活动,教育和培训员工,以尽量减少这些攻击的发生概率。结果分析观察到这个调查是相当优秀的手段,其有效性,以解决上述问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Review of Security Machanism in internet of Things(IoT) Effects of Refactoring upon Efficiency of an NP-Hard Task Assignment Problem: A case study Preventive Techniques of Phishing Attacks in Networks CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTs Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1