Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need...
Uloženo v:
| Vydáno v: | Future internet Ročník 12; číslo 10; s. 168 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Basel
MDPI AG
01.10.2020
|
| Témata: | |
| ISSN: | 1999-5903, 1999-5903 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. |
|---|---|
| AbstractList | Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. Keywords: phishing attacks; phishing types; phishing vectors; phishing technical approaches |
| Audience | Academic |
| Author | Alabdan, Rana |
| Author_xml | – sequence: 1 givenname: Rana orcidid: 0000-0003-2410-486X surname: Alabdan fullname: Alabdan, Rana |
| BookMark | eNptUU1rGzEQFSWFJq4v_QULuZU4kTSr3VVuS0gbQ6CBOL2K0cfacp2VI8kF__sqdWhKyMxhhuG9N18n5GgMoyPkC6PnAJJeDJ5xRilrug_kmEkpZ0JSOPov_0SmKa1pMZC8adpj0t-tfFr5cVn1OaP5lar7Xfzt9pfVYr916az66UwOsSQ42mrhzGr0BjdVv93GgGbl0mfyccBNctOXOCEP364XVzez2x_f51f97czUlOYZmOKoregsCEdhkLxruWi6FgQFzdp26CSImhluKDBtayuaFjuBVlMmLUzI_KBrA67VNvpHjHsV0Ku_hRCXCmP2ZuOUtVprBGNEA7VGXXbVzmpHeStBt3XROj1olSWedi5ltQ67OJbxFRcAjHFZ84I6P6CWWET9OIQc0RS37tGbcvvBl3rf1OX6omueCV8PBBNDStEN_8ZkVD2_SL2-qIDpG7DxGbMPY-niN-9R_gBah5Ju |
| CitedBy_id | crossref_primary_10_1080_23742917_2023_2244210 crossref_primary_10_1155_2021_9957323 crossref_primary_10_51867_ajernet_5_4_54 crossref_primary_10_1016_j_cose_2025_104317 crossref_primary_10_3390_electronics13010030 crossref_primary_10_3390_a15090309 crossref_primary_10_4102_sajim_v27i1_1948 crossref_primary_10_3390_computers14080324 crossref_primary_10_1016_j_cose_2025_104395 crossref_primary_10_1002_ett_70119 crossref_primary_10_1016_j_heliyon_2023_e22336 crossref_primary_10_1109_ACCESS_2025_3525998 crossref_primary_10_1007_s00779_024_01794_9 crossref_primary_10_1080_23742917_2023_2240606 crossref_primary_10_1109_ACCESS_2025_3540075 crossref_primary_10_7717_peerj_cs_2487 crossref_primary_10_1007_s10207_021_00545_8 crossref_primary_10_1088_1742_6596_2131_2_022076 crossref_primary_10_3390_smartcities4030061 crossref_primary_10_1109_JSYST_2022_3168234 crossref_primary_10_1016_j_eswa_2024_124896 crossref_primary_10_1016_j_infsof_2025_107877 crossref_primary_10_3389_fcomp_2024_1428013 crossref_primary_10_3390_app11209733 crossref_primary_10_3390_fi14080229 crossref_primary_10_1016_j_entcom_2024_100815 crossref_primary_10_1057_s41283_023_00130_4 crossref_primary_10_1016_j_procs_2024_12_031 crossref_primary_10_1109_ACCESS_2024_3463871 crossref_primary_10_32628_IJSRST229343 crossref_primary_10_1016_j_trpro_2023_11_286 crossref_primary_10_3390_electronics12030518 crossref_primary_10_1109_ACCESS_2021_3134076 crossref_primary_10_3390_jcp4030033 crossref_primary_10_3390_electronics13142728 crossref_primary_10_1007_s10207_025_01065_5 crossref_primary_10_32604_jcs_2023_043359 crossref_primary_10_3390_s23198070 crossref_primary_10_1007_s10207_023_00768_x crossref_primary_10_4018_IJCAC_353301 crossref_primary_10_3390_healthcare9121653 crossref_primary_10_32604_jcs_2023_045579 crossref_primary_10_1016_j_iot_2023_100886 crossref_primary_10_5604_01_3001_0053_9746 crossref_primary_10_1109_JIOT_2023_3247594 crossref_primary_10_1016_j_jeconc_2023_100034 crossref_primary_10_1016_j_heliyon_2024_e39192 crossref_primary_10_1109_ACCESS_2025_3555157 crossref_primary_10_1109_JPROC_2024_3379855 crossref_primary_10_1007_s11292_024_09648_3 crossref_primary_10_1109_ACCESS_2025_3592135 crossref_primary_10_28925_2663_4023_2025_28_830 crossref_primary_10_1016_j_procs_2021_05_077 crossref_primary_10_3390_fi14080241 crossref_primary_10_17694_bajece_1490596 crossref_primary_10_1007_s10207_023_00778_9 crossref_primary_10_1109_COMST_2024_3441752 crossref_primary_10_1016_j_procs_2024_10_346 crossref_primary_10_32604_cmc_2024_057211 crossref_primary_10_3390_electronics13112034 crossref_primary_10_1155_2022_1699657 crossref_primary_10_1365_s43439_024_00110_8 crossref_primary_10_1016_j_jksuci_2021_11_003 crossref_primary_10_3390_app122111174 crossref_primary_10_1080_19361610_2024_2372986 crossref_primary_10_1177_21582440231217720 crossref_primary_10_1016_j_cose_2025_104443 crossref_primary_10_1108_JFC_06_2022_0140 crossref_primary_10_1007_s10462_023_10454_y crossref_primary_10_1109_JIOT_2024_3495046 crossref_primary_10_1109_ACCESS_2022_3208142 crossref_primary_10_1109_ACCESS_2022_3174259 crossref_primary_10_1109_ACCESS_2025_3555500 crossref_primary_10_3390_fi14040104 crossref_primary_10_7719_jpair_v60i1_934 crossref_primary_10_1016_j_eswa_2023_122199 crossref_primary_10_1109_ACCESS_2024_3524496 crossref_primary_10_32604_cmc_2023_037071 crossref_primary_10_1007_s42979_022_01069_1 |
| Cites_doi | 10.1145/2872427.2883005 10.1109/SKIMA.2016.7916190 10.1145/3290605.3300338 10.1109/ISSA.2016.7802935 10.1145/2835375 10.1016/j.ress.2018.02.025 10.1002/0470086106 10.1109/MC.2011.261 10.23940/ijpe.12.4.p355.mag 10.1109/MC.2012.288 10.1007/s12046-020-01392-4 10.3390/g8020023 10.1016/j.iot.2020.100204 10.1016/j.ejor.2019.01.011 10.1016/S1361-3723(19)30060-0 10.1016/S1361-3723(19)30025-9 10.1016/j.eswa.2018.03.050 10.1016/S1361-3723(16)30089-6 10.1108/09685221211286548 10.1145/3025453.3025831 10.1145/2063176.2063197 10.1155/2017/5421046 10.1016/j.cosrev.2015.04.001 10.1016/j.ress.2020.107224 10.1109/CCNC.2015.7157981 10.1145/3349266.3351419 10.1109/TDSC.2018.2864993 10.11591/csit.v1i1.pp1-12 10.1109/TDSC.2019.2956035 10.1145/1772690.1772720 10.1016/S1353-4858(11)70086-1 10.1109/MSP.2013.106 10.1016/j.cose.2017.12.006 10.1109/MALWARE.2008.4690854 10.1109/BigData.2018.8622505 10.1145/1240624.1240760 10.1109/MSEC.2019.2910013 10.1109/MSEC.2019.2922865 10.1080/10242694.2016.1158440 10.1007/978-3-642-04117-4 10.1016/j.cosrev.2018.05.003 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2020 MDPI AG 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2020 MDPI AG – notice: 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U DOA |
| DOI | 10.3390/fi12100168 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1999-5903 |
| ExternalDocumentID | oai_doaj_org_article_ddbbba3cc5634bab926bedbe02793b74 A643395862 10_3390_fi12100168 |
| GeographicLocations | Saudi Arabia Ukraine |
| GeographicLocations_xml | – name: Saudi Arabia – name: Ukraine |
| GroupedDBID | -DT .4I 5VS 7WY 8FE 8FG 8FL AADQD AAFWJ AAKPC AAYXX ABDBF ABUWG ACIHN ADBBV ADMLS AEAQA AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BCNDV BENPR BEZIV BGLVJ BPHCQ CCPQU CITATION DWQXO E3Z EAP EBS EJD ESX FRNLG GNUQQ GROUPED_DOAJ HCIFZ IAO ICD ITC K60 K6V K6~ K7- KQ8 M0C MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PQBIZ PQBZA PQGLB PQQKQ PROAC RNS TR2 3V. 7SC 7XB 8AL 8FD 8FK ACUHS JQ2 L.- L7M L~C L~D M0N PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c400t-3c3c3abd58d35e03f9287256873503b177f893541c2c031bd4d567a85adb019d3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 100 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000585335900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1999-5903 |
| IngestDate | Fri Oct 03 12:44:37 EDT 2025 Fri Jul 25 22:54:39 EDT 2025 Tue Nov 04 18:35:19 EST 2025 Sat Nov 29 07:13:46 EST 2025 Tue Nov 18 21:16:55 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c400t-3c3c3abd58d35e03f9287256873503b177f893541c2c031bd4d567a85adb019d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-2410-486X |
| OpenAccessLink | https://doaj.org/article/ddbbba3cc5634bab926bedbe02793b74 |
| PQID | 2533112942 |
| PQPubID | 2032396 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_ddbbba3cc5634bab926bedbe02793b74 proquest_journals_2533112942 gale_infotracacademiconefile_A643395862 crossref_primary_10_3390_fi12100168 crossref_citationtrail_10_3390_fi12100168 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-10-01 |
| PublicationDateYYYYMMDD | 2020-10-01 |
| PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Future internet |
| PublicationYear | 2020 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | ref_50 ref_92 Bostick (ref_80) 2018; 175 Qabajeh (ref_72) 2018; 29 ref_58 Gutierrez (ref_86) 2018; 15 Kumar (ref_91) 2020; 10 ref_13 ref_57 Kumar (ref_69) 2019; 17 ref_12 Amanor (ref_31) 2014; 5 ref_56 ref_11 ref_55 ref_10 ref_54 ref_53 ref_51 Shankar (ref_15) 2019; 14 Chiew (ref_14) 2018; 106 ref_16 ref_59 Singh (ref_23) 2007; 12 Hausken (ref_24) 2012; 8 ref_60 Hausken (ref_78) 2020; 11 ref_25 Chaudhary (ref_17) 2014; 2 ref_68 ref_67 Wang (ref_28) 2012; 45 Banday (ref_63) 2011; 12 Kleinrock (ref_29) 2011; 49 ref_62 Caputo (ref_34) 2014; 12 Mohammad (ref_20) 2015; 17 Dwyer (ref_66) 2017; 10 ref_27 ref_26 Hausken (ref_89) 2018; 29 Vidas (ref_49) 2013; Volume 7862 Verma (ref_90) 2020; 1 (ref_43) 2016; 2016 ref_71 ref_70 Suganya (ref_18) 2016; 139 Hong (ref_39) 2012; 55 ref_35 ref_33 ref_77 ref_76 Jakobsson (ref_32) 2007; 7 ref_30 ref_74 ref_73 Bakarich (ref_42) 2019; 14 Jain (ref_81) 2017; 2017 Goel (ref_85) 2018; 73 ref_37 Dakpa (ref_40) 2017; 163 Jakobsson (ref_41) 2019; 17 ref_83 ref_82 Krombholz (ref_22) 2015; 22 Nagunwa (ref_64) 2014; 3 ref_47 Bier (ref_79) 2019; 276 ref_46 ref_44 ref_88 ref_87 Sood (ref_65) 2011; 2011 Tankard (ref_38) 2011; 2011 ref_84 ref_1 Lin (ref_36) 2019; 26 ref_3 ref_2 Shar (ref_45) 2018; 45 Alghoul (ref_75) 2018; 2 Moore (ref_61) 2007; Volume 269 Atkins (ref_21) 2013; 1 ref_48 Hasan (ref_52) 2010; 2 Rader (ref_4) 2013; 5 ref_9 ref_8 Purkait (ref_19) 2012; 20 ref_5 ref_7 ref_6 |
| References_xml | – ident: ref_47 doi: 10.1145/2872427.2883005 – volume: 12 start-page: 76 year: 2011 ident: ref_63 article-title: Phishing—A Growing Threat to E-Commerce publication-title: Bus. Rev. – ident: ref_9 – volume: 163 start-page: 5 year: 2017 ident: ref_40 article-title: Study of Phishing Attacks and Preventions publication-title: Int. J. Comput. Appl. – ident: ref_74 – ident: ref_5 – volume: 5 start-page: 297 year: 2014 ident: ref_31 article-title: Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices publication-title: J. Emerg. Trends Comput. Inf. Sci. – ident: ref_26 – ident: ref_51 – ident: ref_16 doi: 10.1109/SKIMA.2016.7916190 – volume: 3 start-page: 72 year: 2014 ident: ref_64 article-title: Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors publication-title: Int. J. Cyber-Secur. Digit. Forensics – ident: ref_88 doi: 10.1145/3290605.3300338 – ident: ref_30 doi: 10.1109/ISSA.2016.7802935 – volume: 2 start-page: 17 year: 2010 ident: ref_52 article-title: Case Study On Social Engineering Techniques for Persuasion publication-title: Int. J. Appl. Graph Theory Wirel. Ad Hoc Netw. Sens. Netw. – volume: 7 start-page: 1 year: 2007 ident: ref_32 article-title: The Human Factor in Phishing publication-title: Priv. Secur. Consum. Inf. – ident: ref_35 doi: 10.1145/2835375 – volume: 175 start-page: 19 year: 2018 ident: ref_80 article-title: Resilience science, policy and investment for civil infrastructure publication-title: Reliab. Eng. Syst. Saf. doi: 10.1016/j.ress.2018.02.025 – ident: ref_2 doi: 10.1002/0470086106 – volume: 45 start-page: 55 year: 2018 ident: ref_45 article-title: Defending Against Cross Site Scripting Attacks publication-title: IEEE Comput. Soc. doi: 10.1109/MC.2011.261 – ident: ref_58 – volume: 8 start-page: 355 year: 2012 ident: ref_24 article-title: Review of systems defense and attack models publication-title: Int. J. Perform. Eng. doi: 10.23940/ijpe.12.4.p355.mag – volume: 45 start-page: 52 year: 2012 ident: ref_28 article-title: Smartphone security challenges publication-title: Computer doi: 10.1109/MC.2012.288 – volume: 14 start-page: 2171 year: 2019 ident: ref_15 article-title: A Review on Phishing Attacks publication-title: Int. J. Appl. Eng. Res. – ident: ref_8 – ident: ref_56 – ident: ref_77 doi: 10.1007/s12046-020-01392-4 – ident: ref_27 – volume: 5 start-page: 23 year: 2013 ident: ref_4 article-title: Phishing Techniques and Mitigating the Associated Security Risks publication-title: Int. J. Netw. Secur. Appl. – ident: ref_48 – ident: ref_87 doi: 10.3390/g8020023 – ident: ref_10 – ident: ref_83 – volume: 11 start-page: 100204 year: 2020 ident: ref_78 article-title: Cyber resilience in firms, organizations and societies publication-title: Internet Things doi: 10.1016/j.iot.2020.100204 – volume: 276 start-page: 626 year: 2019 ident: ref_79 article-title: Risk analysis beyond vulnerability and resilience—Characterizing the defensibility of critical systems publication-title: Eur. J. Oper. Res. doi: 10.1016/j.ejor.2019.01.011 – ident: ref_92 doi: 10.1016/S1361-3723(19)30060-0 – ident: ref_13 – ident: ref_7 doi: 10.1016/S1361-3723(19)30025-9 – volume: 106 start-page: 1 year: 2018 ident: ref_14 article-title: A survey of phishing attacks: Their types, vectors and technical approaches publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2018.03.050 – volume: 2016 start-page: 5 year: 2016 ident: ref_43 article-title: The imitation game: How business email compromise scams are robbing organisations publication-title: Comput. Fraud Secur. doi: 10.1016/S1361-3723(16)30089-6 – volume: 2 start-page: 8 year: 2018 ident: ref_75 article-title: Email Classification Using Artificial Neural Network publication-title: Int. J. Acad. Eng. Res. – volume: 20 start-page: 382 year: 2012 ident: ref_19 article-title: Phishing counter measures and their effectiveness—Literature review publication-title: Inf. Manag. Comput. Secur. doi: 10.1108/09685221211286548 – volume: 14 start-page: A1 year: 2019 ident: ref_42 article-title: Something Phish-y is Going On Here: A Teaching Case on Business Email Compromise publication-title: Curr. Issues Audit. – ident: ref_53 – ident: ref_37 doi: 10.1145/3025453.3025831 – volume: 2011 start-page: 11 year: 2011 ident: ref_65 article-title: Malvertising—Exploiting web advertising publication-title: Comput. Fraud Secur. – ident: ref_76 – volume: 10 start-page: 486 year: 2020 ident: ref_91 article-title: A Novel Hybrid Approach of SVM Combined with NLP and Probabilistic Neural Network for Email Phishing publication-title: Int. J. Electr. Comput. Eng. – volume: 55 start-page: 74 year: 2012 ident: ref_39 article-title: The Current State of Phishing Attacks publication-title: Commun. ACM doi: 10.1145/2063176.2063197 – ident: ref_3 – volume: 2017 start-page: 5421046 year: 2017 ident: ref_81 article-title: Phishing Detection: Analysis of Visual Similarity Based Approaches publication-title: Secur. Commun. Netw. doi: 10.1155/2017/5421046 – volume: 17 start-page: 1 year: 2015 ident: ref_20 article-title: Tutorial and critical analysis of phishing websites methods publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2015.04.001 – volume: 49 start-page: 12 year: 2011 ident: ref_29 article-title: Comments on ‘an early history of the internet’ publication-title: IEEE Commun. Mag. – ident: ref_11 – ident: ref_62 doi: 10.1016/j.ress.2020.107224 – volume: 26 start-page: 32 year: 2019 ident: ref_36 article-title: Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content publication-title: ACM Trans. Comput. Interact. – ident: ref_67 – ident: ref_68 doi: 10.1109/CCNC.2015.7157981 – ident: ref_84 doi: 10.1145/3349266.3351419 – volume: 15 start-page: 988 year: 2018 ident: ref_86 article-title: Learning from the Ones That Got Away: Detecting New Forms of Phishing Attacks publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2018.2864993 – ident: ref_44 – volume: Volume 7862 start-page: 52 year: 2013 ident: ref_49 article-title: QRishing: The susceptibility of smartphone users to QR code phishing attacks publication-title: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) – volume: 2 start-page: 55 year: 2014 ident: ref_17 article-title: Development Review on Phishing: A Computer Security Threat publication-title: Int. J. Adv. Res. Comput. Sci. Manag. Stud. – ident: ref_73 – volume: 1 start-page: 1 year: 2020 ident: ref_90 article-title: Email Phishing: Text Classification Using Natural Language Processing publication-title: Comput. Sci. Inf. Technol. doi: 10.11591/csit.v1i1.pp1-12 – ident: ref_71 doi: 10.1109/TDSC.2019.2956035 – ident: ref_55 doi: 10.1145/1772690.1772720 – volume: 1 start-page: 23 year: 2013 ident: ref_21 article-title: A Study of Social Engineering in Online Frauds publication-title: Open J. Soc. Sci. – volume: 2011 start-page: 16 year: 2011 ident: ref_38 article-title: Advanced Persistent threats and how to monitor and deter them publication-title: Netw. Secur. doi: 10.1016/S1353-4858(11)70086-1 – volume: 12 start-page: 28 year: 2014 ident: ref_34 article-title: Going spear phishing: Exploring embedded training and awareness publication-title: IEEE Secur. Priv. doi: 10.1109/MSP.2013.106 – ident: ref_6 – volume: 73 start-page: 519 year: 2018 ident: ref_85 article-title: Mobile Phishing Attacks and Defence Mechanisms: State of Art and Open Research Challenges publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.12.006 – ident: ref_25 – ident: ref_50 – ident: ref_59 doi: 10.1109/MALWARE.2008.4690854 – volume: Volume 269 start-page: 1 year: 2007 ident: ref_61 article-title: Examining the impact of website take-down on phishing publication-title: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit on—eCrime ’07 – ident: ref_33 doi: 10.1109/BigData.2018.8622505 – ident: ref_46 – ident: ref_12 – volume: 139 start-page: 20 year: 2016 ident: ref_18 article-title: A Review on Phishing Attacks and Various Anti Phishing Techniques publication-title: Int. J. Comput. Appl. – ident: ref_54 doi: 10.1145/1240624.1240760 – volume: 17 start-page: 18 year: 2019 ident: ref_69 article-title: Emerging Threats in Internet of Things Voice Services publication-title: IEEE Secur. Priv. doi: 10.1109/MSEC.2019.2910013 – volume: 22 start-page: 113 year: 2015 ident: ref_22 article-title: Advanced social engineering attacks publication-title: J. Inf. Secur. Appl. – volume: 10 start-page: 29 year: 2017 ident: ref_66 article-title: Malvertising—A Rising Threat to The Online Ecosystem publication-title: J. Inf. Syst. Appl. Res. – ident: ref_70 – ident: ref_82 doi: 10.1016/S1361-3723(19)30025-9 – volume: 12 start-page: 1 year: 2007 ident: ref_23 article-title: Online Frauds in Banks with Phishing publication-title: J. Internet Bank. Commer. – volume: 17 start-page: 68 year: 2019 ident: ref_41 article-title: The Rising Threat of Launchpad Attacks publication-title: IEEE Secur. Priv. doi: 10.1109/MSEC.2019.2922865 – ident: ref_60 – volume: 29 start-page: 111 year: 2018 ident: ref_89 article-title: A cost–benefit analysis of terrorist attacks publication-title: Def. Peace Econ. doi: 10.1080/10242694.2016.1158440 – ident: ref_1 doi: 10.1007/978-3-642-04117-4 – ident: ref_57 – volume: 29 start-page: 44 year: 2018 ident: ref_72 article-title: A recent review of conventional vs. automated cybersecurity anti-phishing techniques publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2018.05.003 |
| SSID | ssj0000392667 |
| Score | 2.5441349 |
| SecondaryResourceType | review_article |
| Snippet | Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are... |
| SourceID | doaj proquest gale crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 168 |
| SubjectTerms | Analysis Black markets Cybercrime Data security Electronic mail systems Identity theft Informal economy Internet Literature reviews Malware Net losses Personal information Phishing phishing attacks phishing technical approaches phishing types phishing vectors Power Security management Software services |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Na9wwEB3StIfm0Db9oNumwdBACETEtmRb7qW4JSFQWBaSlL0JfTkNlN3N2lnIv8-MVrvbQttL8cXIOsh-Gum9sf0G4AAVF5mKOCayNGXCc8u0Nikz0gjOXS6dFaHYRDUcyvG4HsWEWxc_q1ytiWGhdlNLOfKTHHkJcQORf57dMqoaRW9XYwmNR_A4y_OM5vm3iq1zLClu_mVZLV1JOar7k_aGDLOQ5sjf9qFg1_-3RTnsNGfP_3eML-BZ5JhJs5wUu7DlJy9h5xfnwVfQjH4sk09J0_f0m31ycTdf-PtPCQnT7jj5HrL5eKInLgn5d0IzaaIFue9ew9XZ6eXXcxarKTCLcdozbvHQxhXS8cKnvK1RLCHhkRUvUk4uVC1yl0JkNrcY6cYJV5SVloV2Bnmg429gezKd-LeQ8LL1Vla1qw2ZTXIts8yKzKRlis2ZH8DR6tkqG63GqeLFT4WSg3BQGxwG8HHdd7Y02Phjry8E0boHmWKHhun8WsUYU84ZYzS3tii5MNog-MY741F519xUYgCHBLCi0MXhWB3_QMCbIhMs1SA743WBGm8AeyuAVYzpTm3Qfffvy-_haU6qPHzytwfb_fzOf4AndtHfdPP9MEUfAETJ7SA priority: 102 providerName: ProQuest |
| Title | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
| URI | https://www.proquest.com/docview/2533112942 https://doaj.org/article/ddbbba3cc5634bab926bedbe02793b74 |
| Volume | 12 |
| WOSCitedRecordID | wos000585335900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: DOA dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: M~E dateStart: 20090101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ABI/INFORM Collection customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: 7WY dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/abicomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ABI/INFORM Global customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: M0C dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/abiglobal providerName: ProQuest – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: P5Z dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: K7- dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: BENPR dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1999-5903 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000392667 issn: 1999-5903 databaseCode: PIMPY dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3fS90wFD449WF7EN0c3qmXggMZrNg2SZv6VkVRxEtxc_54Cfl1UZC7cW8V_O89J616BWUvUgglzUNyTk_yfSH5DsB3ZFwkKuJiniZJzD2zsdYmiY00nDGXSWd5SDZRDAby_Lysp1J90ZmwVh64NdyWc8YYzawVOeNGmzLLjXfGI50qmSmCEiiinikyFeZgXPbzvGj1SBny-q3hNUllIcCRL1agINT_1nQc1pj9RVjowGFUtZ1aghk_-gyfpiQDv0BVX7W7RlHVNHQ_Pvp1O77z99sRMcrJz-hP2IbHFz1yUdg4JzdEVacd7ifLcLq_93v3IO7SIMQWA6yJmcVHGyekY8InbFgiy0GkIgsmEkbyUUMEHYKnNrMYosZxJ_JCS6GdQQDn2FeYHf0d-RWIWD70VhalKw2pRDIt09Ty1CR5gtWp78GPR9Mo22mEU6qKG4Vcgcyons3Yg42ntv9aZYxXW-2QhZ9akJp1qEAfq87H6n8-7sEm-UdRzGF3rO6uDuCgSL1KVQirWCmQnPVg7dGFqgvGicoQ0hKs5Nm39-jNKnzMiHSHE31rMNuMb_06zNu75noy7sOH4uyiD3M7e4P6pB_-SiyPihjL42QXy1pc4vf68Li-eABF2ehT |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3da9UwFD_MKagPfotXpwZURLAsbdI2FUTqdGxsXgZO2VvM190Gcu-87Sb7p_wbPSdt7xTUtz1IX0oSStPz6_lK8jsATzHiIlIRn8iU80QG4RJjLE-sslIInynvZCw2UY7Ham-v2lmCH8NZGNpWOejEqKj9zFGOfDVDv4R8A5m9OfqWUNUoWl0dSmh0sNgKp98xZGteb75D-T7LsvX3u2sbSV9VIHGI1zYRDi9jfa68yAMXkwqDBjT8qhQ5F8TGNEEbnsvUZQ4Rb730eVEalRtv0R_yAp97AS5KiZ20VZCvLXI6HJ2Noig7FlQhKr46OSSCLnSr1G92L5YH-JsRiJZt_fr_9k1uwLXeh2Z1B_qbsBSmt-DqL8yKt6HeOeiSa6xuW6IRYB-P5yfh9BWjwLt5yT7H1Qq8MVPP4voCoZXVPcV6aO7Ap3OZw11Yns6m4R4wUUyCU2XlK0tkmsKoNHUytbzg2JyGEbwYZKldT6VOFT2-agypSO76TO4jeLIYe9QRiPxx1FuCxGIEkX7Hhtl8X_c6RHtvrTXCubwQ0hqLYLPB28AzVLK2lCN4ToDSpJrwdZzpT1jgpIjkS9fofYoqxxh2BCsDoHSvsxp9hqb7_-5-DJc3dj9s6-3N8dYDuJJRBiJub1yB5XZ-HB7CJXfSHjbzR_H3YPDlvLH3E-YJR4w |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1ba9RAFD7UKlIfvIurVQMqIjjsJDO5CSLRulhWlgUv9G2cW2pBdusmrfSv-es8Z5JsFdS3PkhewmQImcw353xnLt8BeIQRF4mKOCZjzpn0wjKtDWemMFIIlxTOypBsIp_Nir29cr4BP4azMLStcrCJwVC7paU58nGCvIS4gUzGdb8tYr4zeXn4jVEGKVppHdJpdBCZ-pPvGL41L3Z3sK8fJ8nkzYfXb1mfYYBZxG7LhMVLG5cWTqSei7rEAAJJQJGLlAtSZqrRn6cytolF9BsnXZrluki1M8iNnMD3noPz6IVTGmPTnK3ndzgSjyzLO0VUIUo-rg9IrAspVvGbDwypAv7mEIKXm1z5n__PVbjcc-uo6gbDNdjwi-tw6RfFxRtQzb90k25R1bYkLxC9P1od-5PnEQXkzbPoU1jFwBu9cFFYdyAUR1Uvve6bm_DxTNpwCzYXy4W_DZHIam-LvHSlIZFNoYs4tjI2PONYHPsRPB36VdleYp0yfXxVGGoRBtQpBkbwcF33sBMW-WOtVwSPdQ0SAw8Fy9W-6m2Lcs4Yo4W1aSak0QaBZ7wznidofE0uR_CEwKXIZOHnWN2fvMBGkfiXqpCVijLF2HYE2wO4VG_LGnWKrDv_fvwALiLk1Lvd2fQubCU0MRF2PW7DZrs68vfggj1uD5rV_TBSIvh81tD7CRvYUDI |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Phishing+Attacks+Survey%3A+Types%2C+Vectors%2C+and+Technical+Approaches&rft.jtitle=Future+internet&rft.au=Rana+Alabdan&rft.date=2020-10-01&rft.pub=MDPI+AG&rft.eissn=1999-5903&rft.volume=12&rft.issue=10&rft.spage=168&rft_id=info:doi/10.3390%2Ffi12100168&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_ddbbba3cc5634bab926bedbe02793b74 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1999-5903&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1999-5903&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1999-5903&client=summon |