{"title":"网络钓鱼电子邮件检测与防护技术综述","authors":"Santosh Kumar Birthriya, A. Jain","doi":"10.1080/19393555.2021.1959678","DOIUrl":null,"url":null,"abstract":"ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Comprehensive Survey of Phishing Email Detection and Protection Techniques\",\"authors\":\"Santosh Kumar Birthriya, A. Jain\",\"doi\":\"10.1080/19393555.2021.1959678\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.\",\"PeriodicalId\":103842,\"journal\":{\"name\":\"Information Security Journal: A Global Perspective\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Journal: A Global Perspective\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/19393555.2021.1959678\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2021.1959678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Survey of Phishing Email Detection and Protection Techniques
ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.