IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Phishing Attack – Detection and Removal


    Author(s): PRIPAS, Marian-Iulian

    Quick view | Full article | Citations | Views: 1,149


    Author(s) keywords: , , ,


    Reference keywords:


    Abstract:

    This paper reviews the main methods to combat phishing (especially those which targets the e-mail servers existing on the Internet) and discuss about phishing eradication, automatic identification of phishing and compromised email accounts. Phishing is one of the most common computer crime, the goal being to collect confidential information like passwords, PIN codes, account numbers, card numbers, and then using them for stealing the money. Usually, phishing is correlated with companies in the banking and financial industry or even online stores.



    References:

    [1]. A. Bergholz J. de Beer, S. Glahn, M. Moens G. Paab and S. Strobel, “New filtering approaches for phishing email”, Journal of Computer Security, 18(1), 2010, pp. 7-35.

    [2]. J.S. Downs, M.B. Holbrook and L.F. Cranor, “Decision strategies and susceptibility to phishing”, Proceedings of the second symposium on Usable privacy and security, ACM, 2006, pp. 79-90.

    [3]. Z. Ramzan, "Phishing attacks and countermeasures", Peter Stavroulakis, Mark Stamp (Eds.), Handbook of Information and Communication Security, Springer, 2010.

    [4]. Phishing Attack (2014, Apr. 22). [Online] Available: http://en.wikipedia.org/wiki/Phishing

    [5]. Protecting against Phishing Attacks (2014, Feb.06). [Online] Available: http://www.antiphishing.org/resources/

    [6]. Phishing Attack Stats (2014, Feb. 13). [Online] Available: http://www.arbornetworks.com/asert/2006/04/some-q1-06-phishing-stats/



    Additional Information

    English title: Phishing Attack – Detection and Removal
    Original title: Detectarea și eliminarea Phishing-ului
    Author(s): PRIPAS, Marian-Iulian
    Article Language: Romanian
    Date of Publication: 2014-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2014.01.07
    Issue: Volume 3, Issue 1, Year 2014
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 59-64 (6 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.