Visible to the public Preventive Techniques of Phishing Attacks in Networks

TitlePreventive Techniques of Phishing Attacks in Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsAdil, M., Khan, R., Ghani, M. A. Nawaz Ul
Conference Name2020 3rd International Conference on Advancements in Computational Sciences (ICACS)
Date PublishedFeb. 2020
PublisherIEEE
ISBN Number978-1-7281-4235-7
KeywordsAnti-phishing, Computer crime, e-hunting websites, Electronic mail, fake applications, fake Websites, Honey Pot, honey pots, Human Behavior, human factors, Information security, information technology, Internet, machine learning, Malware, Network security, online applications, online businesses, phishing, phishing attack preventive techniques, pubcrawl, resilience, Resiliency, Scalability, security threats, Social Engineering, spam, Web sites
Abstract

Internet is the most widely used technology in the current era of information technology and it is embedded in daily life activities. Due to its extensive use in everyday life, it has many applications such as social media (Face book, WhatsApp, messenger etc.,) and other online applications such as online businesses, e-counseling, advertisement on websites, e-banking, e-hunting websites, e-doctor appointment and e-doctor opinion. The above mentioned applications of internet technology makes things very easy and accessible for human being in limited time, however, this technology is vulnerable to various security threats. A vital and severe threat associated with this technology or a particular application is "Phishing attack" which is used by attacker to usurp the network security. Phishing attacks includes fake E-mails, fake websites, fake applications which are used to steal their credentials or usurp their security. In this paper, a detailed overview of various phishing attacks, specifically their background knowledge, and solutions proposed in literature to address these issues using various techniques such as anti-phishing, honey pots and firewalls etc. Moreover, installation of intrusion detection systems (IDS) and intrusion detection and prevention system (IPS) in the networks to allow the authentic traffic in an operational network. In this work, we have conducted end use awareness campaign to educate and train the employs in order to minimize the occurrence probability of these attacks. The result analysis observed for this survey was quite excellent by means of its effectiveness to address the aforementioned issues.

URLhttps://ieeexplore.ieee.org/document/9055943
DOI10.1109/ICACS47775.2020.9055943
Citation Keyadil_preventive_2020