Review Paper on Privacy Preservation through Phishing Email Filter

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-9 Number-12
Year of Publication : 2014
Authors : Pranal C.Tayade , Prof. Avinash P.Wadhe
  10.14445/22315381/IJETT-V9P314

Citation 

Pranal C.Tayade , Prof. Avinash P.Wadhe. "Review Paper on Privacy Preservation through Phishing Email Filter", International Journal of Engineering Trends and Technology (IJETT), V9(12),600-604 March 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Phishing is the combination of social engineering and technical exploits designed which creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting sensitive information such as online banking passwords and credit card details, personal and financial information by masquerading as a trustworthy entity in an electronic communication. Phishing is a new type of network attack which constitutes more than half of all security incidents on the internet. Email based online phishing is critical security thread on the internet. More and more user are suffering from email based phishing attack over a last few year. Phishing email contains messages to lure victims into performing certain action, such as clicking on URL where phishing site is hosted. This paper present overview about phishing email attack, its classification and preventing approaches. Email phishing attacks fabricate the email`s origin. Unfortunately, current email server systems cannot authenticate the genuineness of incoming emails.

References

[1] Ammar Almomani, B. B. Gupta, Samer Atawneh, A. Meulenberg, and Eman Almomani., A survey of phishing email filtering techniques, IEEE communications surveys & tutorials, vol. 15, no. 4, fourth quarter 2013.
[2] Jyoti Chhikara, Ritu Dahiya, Neha Garg, Monika Rani, Phishing & Anti-Phishing Techniques: Case Study, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 ISSN: 2277 128X.
[3] Aryan Chandrapal Singh1, Kiran P. Somase2, Keshav G. Tambre3, Phishing: A Computer Security Threat, International Journal of Advance Research in Computer Science and Management Studies Volume 1, Issue 7, December 2013 ISSN: 2321-7782.
[4]APWG, Phishing Activity Trends Report, 3rd Quarter 2013. http://www.apwg.org.
[5] Ammar ALmomani; B. B. Gupta; Tat-Chee Wan; Altyeb Altaher; Selvakumar Manickam, Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email, Indian Journal of Science and Technology, Vol: 6 Issue: 1 January 2013 ISSN:0974-6846.
[6] Jingguo Wang,Tejaswini Herath,Rui Chen,Arun Aishwanath, and H. Raghav Rao, Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email,” IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, VOL. 55, NO. 4, DECEMBER 2012.
[7] Ram Basnet, Srinivas Mukkamala, and Andrew H. Sung,” Detection of Phishing Attacks: A Machine Learning Approach”, Soft Computing Applications in Industry, STUDFUZZ 226, pp. 373–383, 2008.
[8] Ian Fette, Norman Sadeh, Anthony Tomasic, Learning to Detect Phishing Emails, Track: Security, Privacy, Reliability, and Ethics WWW 2007.
[9]S. Garera, N. Provos, M. Chew, and A. D. Rubin., A framework for detection and measurement of phishing attacks. In Proceedings of the WORM, 2007.
[10] W. Liu, X. Deng, G. Huang and A. Y. Fu, An Antiphishing Strategy Based on Visual Similarity Assessment, Published by the IEEE Computer Society 1089-7801/06 IEEE, INTERNET COMPUTING IEEE, 2006.
[11] R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 581–590, 2006.
[12] Engin Kirda, Christopher Kruegel, Protecting Users Against Phishing Attacks, Published by Oxford University, The Computer Journal Vol. 00 No. 0, 2005.
[13] Engin Kirda and Christopher Kruegel, Protecting Users Against Phishing Attacks with AntiPhish, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC’05)IEEE 0730-3157/05 $20.00 © 2005.
[14] Gunter Ollman. The Phishing Guide - Under- standing and Preventing Phishing Attacks. White Paper, Next Generation Security Software Ltd., 2004.
[15] Juan Chen, Chuanxiong Guo, Online Detection and Prevention of Phishing Attacks, The National Natural Science Foundation of China (NSFC) under contract No. 60503049.

Keywords
Phishing, Phishing Email, Attack, Security.