Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/1025
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVarshney G.en_US
dc.contributor.authorKumawat R.en_US
dc.contributor.authorVaradharajan V.en_US
dc.contributor.authorTupakula U.en_US
dc.contributor.authorGupta C.en_US
dc.date.accessioned2023-11-30T09:01:28Z-
dc.date.available2023-11-30T09:01:28Z-
dc.date.issued2024-
dc.identifier.issn0957-4174-
dc.identifier.otherEID(2-s2.0-85175301766)-
dc.identifier.urihttps://dx.doi.org/10.1016/j.eswa.2023.122199-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1025-
dc.description.abstractPhishing is a form of deception technique that attackers often use to acquire sensitive information related to individuals and organizations fraudulently. Although Phishing attacks have been known for more than two decades, and there is ongoing research for developing effective techniques against these attacks, the increasing trend of attacks confirms the lack of robust solutions and techniques against these attacks. According to Trend Micro, over 90 percent of all Cybersecurity attacks begin with spear Phishing emails and hence there is a need for comprehensive research in the area of anti-Phishing to improve the overall Cybersecurity landscape. This paper, therefore, performs a comprehensive study and analysis of past research work in anti-Phishing. The survey also tries to study various relationships such as those between the Phishers and the motives behind Phishing and explores/assesses various tactics that are employed for launching Phishing attacks. Highlighting the role of social and cognitive factors in the success of a Phishing attack which was not focused on in earlier reviews, is one of the major contributions of this work. The paper also provides a detailed understanding of the types of Phishers and the type of Phishing performed by them with a comprehensive classification of anti-Phishing detection/prevention/awareness solutions through a systematic literature review. The contributions of leading organizations and their active role through various anti-Phishing products are also discussed in this paper to bring light to the research and development happening in the industry with respect to anti-Phishing. Finally, the cyber laws to handle Phishing attacks in various countries have been presented for readers’ interest. We believe this survey brings new knowledge and a comprehensive perspective to its readers from academia and industry to explore new horizons for research activities in anti-Phishing. © 2023 Elsevier Ltden_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceExpert Systems with Applicationsen_US
dc.subjectAnti-phishingen_US
dc.subjectCyber lawsen_US
dc.subjectDeceptionen_US
dc.subjectPhishingen_US
dc.subjectSocial and cognitive factorsen_US
dc.titleAnti-phishing: A comprehensive perspectiveen_US
dc.typeReviewen_US
Appears in Collections:Review

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.