Phishing Attacks Survey: Types, Vectors, and Technical Approaches

Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need...

Full description

Saved in:
Bibliographic Details
Published in:Future internet Vol. 12; no. 10; p. 168
Main Author: Alabdan, Rana
Format: Journal Article
Language:English
Published: Basel MDPI AG 01.10.2020
Subjects:
ISSN:1999-5903, 1999-5903
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.
AbstractList Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. Keywords: phishing attacks; phishing types; phishing vectors; phishing technical approaches
Audience Academic
Author Alabdan, Rana
Author_xml – sequence: 1
  givenname: Rana
  orcidid: 0000-0003-2410-486X
  surname: Alabdan
  fullname: Alabdan, Rana
BookMark eNptUU1rGzEQFSWFJq4v_QULuZU4kTSr3VVuS0gbQ6CBOL2K0cfacp2VI8kF__sqdWhKyMxhhuG9N18n5GgMoyPkC6PnAJJeDJ5xRilrug_kmEkpZ0JSOPov_0SmKa1pMZC8adpj0t-tfFr5cVn1OaP5lar7Xfzt9pfVYr916az66UwOsSQ42mrhzGr0BjdVv93GgGbl0mfyccBNctOXOCEP364XVzez2x_f51f97czUlOYZmOKoregsCEdhkLxruWi6FgQFzdp26CSImhluKDBtayuaFjuBVlMmLUzI_KBrA67VNvpHjHsV0Ku_hRCXCmP2ZuOUtVprBGNEA7VGXXbVzmpHeStBt3XROj1olSWedi5ltQ67OJbxFRcAjHFZ84I6P6CWWET9OIQc0RS37tGbcvvBl3rf1OX6omueCV8PBBNDStEN_8ZkVD2_SL2-qIDpG7DxGbMPY-niN-9R_gBah5Ju
CitedBy_id crossref_primary_10_1080_23742917_2023_2244210
crossref_primary_10_1155_2021_9957323
crossref_primary_10_51867_ajernet_5_4_54
crossref_primary_10_1016_j_cose_2025_104317
crossref_primary_10_3390_electronics13010030
crossref_primary_10_3390_a15090309
crossref_primary_10_4102_sajim_v27i1_1948
crossref_primary_10_3390_computers14080324
crossref_primary_10_1016_j_cose_2025_104395
crossref_primary_10_1002_ett_70119
crossref_primary_10_1016_j_heliyon_2023_e22336
crossref_primary_10_1109_ACCESS_2025_3525998
crossref_primary_10_1007_s00779_024_01794_9
crossref_primary_10_1080_23742917_2023_2240606
crossref_primary_10_1109_ACCESS_2025_3540075
crossref_primary_10_7717_peerj_cs_2487
crossref_primary_10_1007_s10207_021_00545_8
crossref_primary_10_1088_1742_6596_2131_2_022076
crossref_primary_10_3390_smartcities4030061
crossref_primary_10_1109_JSYST_2022_3168234
crossref_primary_10_1016_j_eswa_2024_124896
crossref_primary_10_1016_j_infsof_2025_107877
crossref_primary_10_3389_fcomp_2024_1428013
crossref_primary_10_3390_app11209733
crossref_primary_10_3390_fi14080229
crossref_primary_10_1016_j_entcom_2024_100815
crossref_primary_10_1057_s41283_023_00130_4
crossref_primary_10_1016_j_procs_2024_12_031
crossref_primary_10_1109_ACCESS_2024_3463871
crossref_primary_10_32628_IJSRST229343
crossref_primary_10_1016_j_trpro_2023_11_286
crossref_primary_10_3390_electronics12030518
crossref_primary_10_1109_ACCESS_2021_3134076
crossref_primary_10_3390_jcp4030033
crossref_primary_10_3390_electronics13142728
crossref_primary_10_1007_s10207_025_01065_5
crossref_primary_10_32604_jcs_2023_043359
crossref_primary_10_3390_s23198070
crossref_primary_10_1007_s10207_023_00768_x
crossref_primary_10_4018_IJCAC_353301
crossref_primary_10_3390_healthcare9121653
crossref_primary_10_32604_jcs_2023_045579
crossref_primary_10_1016_j_iot_2023_100886
crossref_primary_10_5604_01_3001_0053_9746
crossref_primary_10_1109_JIOT_2023_3247594
crossref_primary_10_1016_j_jeconc_2023_100034
crossref_primary_10_1016_j_heliyon_2024_e39192
crossref_primary_10_1109_ACCESS_2025_3555157
crossref_primary_10_1109_JPROC_2024_3379855
crossref_primary_10_1007_s11292_024_09648_3
crossref_primary_10_1109_ACCESS_2025_3592135
crossref_primary_10_28925_2663_4023_2025_28_830
crossref_primary_10_1016_j_procs_2021_05_077
crossref_primary_10_3390_fi14080241
crossref_primary_10_17694_bajece_1490596
crossref_primary_10_1007_s10207_023_00778_9
crossref_primary_10_1109_COMST_2024_3441752
crossref_primary_10_1016_j_procs_2024_10_346
crossref_primary_10_32604_cmc_2024_057211
crossref_primary_10_3390_electronics13112034
crossref_primary_10_1155_2022_1699657
crossref_primary_10_1365_s43439_024_00110_8
crossref_primary_10_1016_j_jksuci_2021_11_003
crossref_primary_10_3390_app122111174
crossref_primary_10_1080_19361610_2024_2372986
crossref_primary_10_1177_21582440231217720
crossref_primary_10_1016_j_cose_2025_104443
crossref_primary_10_1108_JFC_06_2022_0140
crossref_primary_10_1007_s10462_023_10454_y
crossref_primary_10_1109_JIOT_2024_3495046
crossref_primary_10_1109_ACCESS_2022_3208142
crossref_primary_10_1109_ACCESS_2022_3174259
crossref_primary_10_1109_ACCESS_2025_3555500
crossref_primary_10_3390_fi14040104
crossref_primary_10_7719_jpair_v60i1_934
crossref_primary_10_1016_j_eswa_2023_122199
crossref_primary_10_1109_ACCESS_2024_3524496
crossref_primary_10_32604_cmc_2023_037071
crossref_primary_10_1007_s42979_022_01069_1
Cites_doi 10.1145/2872427.2883005
10.1109/SKIMA.2016.7916190
10.1145/3290605.3300338
10.1109/ISSA.2016.7802935
10.1145/2835375
10.1016/j.ress.2018.02.025
10.1002/0470086106
10.1109/MC.2011.261
10.23940/ijpe.12.4.p355.mag
10.1109/MC.2012.288
10.1007/s12046-020-01392-4
10.3390/g8020023
10.1016/j.iot.2020.100204
10.1016/j.ejor.2019.01.011
10.1016/S1361-3723(19)30060-0
10.1016/S1361-3723(19)30025-9
10.1016/j.eswa.2018.03.050
10.1016/S1361-3723(16)30089-6
10.1108/09685221211286548
10.1145/3025453.3025831
10.1145/2063176.2063197
10.1155/2017/5421046
10.1016/j.cosrev.2015.04.001
10.1016/j.ress.2020.107224
10.1109/CCNC.2015.7157981
10.1145/3349266.3351419
10.1109/TDSC.2018.2864993
10.11591/csit.v1i1.pp1-12
10.1109/TDSC.2019.2956035
10.1145/1772690.1772720
10.1016/S1353-4858(11)70086-1
10.1109/MSP.2013.106
10.1016/j.cose.2017.12.006
10.1109/MALWARE.2008.4690854
10.1109/BigData.2018.8622505
10.1145/1240624.1240760
10.1109/MSEC.2019.2910013
10.1109/MSEC.2019.2922865
10.1080/10242694.2016.1158440
10.1007/978-3-642-04117-4
10.1016/j.cosrev.2018.05.003
ContentType Journal Article
Copyright COPYRIGHT 2020 MDPI AG
2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2020 MDPI AG
– notice: 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOA
DOI 10.3390/fi12100168
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni Edition)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
CrossRef

Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1999-5903
ExternalDocumentID oai_doaj_org_article_ddbbba3cc5634bab926bedbe02793b74
A643395862
10_3390_fi12100168
GeographicLocations Saudi Arabia
Ukraine
GeographicLocations_xml – name: Saudi Arabia
– name: Ukraine
GroupedDBID -DT
.4I
5VS
7WY
8FE
8FG
8FL
AADQD
AAFWJ
AAKPC
AAYXX
ABDBF
ABUWG
ACIHN
ADBBV
ADMLS
AEAQA
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BCNDV
BENPR
BEZIV
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
E3Z
EAP
EBS
EJD
ESX
FRNLG
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
K60
K6V
K6~
K7-
KQ8
M0C
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
RNS
TR2
3V.
7SC
7XB
8AL
8FD
8FK
ACUHS
JQ2
L.-
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c400t-3c3c3abd58d35e03f9287256873503b177f893541c2c031bd4d567a85adb019d3
IEDL.DBID K7-
ISICitedReferencesCount 100
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000585335900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1999-5903
IngestDate Fri Oct 03 12:44:37 EDT 2025
Fri Jul 25 22:54:39 EDT 2025
Tue Nov 04 18:35:19 EST 2025
Sat Nov 29 07:13:46 EST 2025
Tue Nov 18 21:16:55 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c400t-3c3c3abd58d35e03f9287256873503b177f893541c2c031bd4d567a85adb019d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2410-486X
OpenAccessLink https://www.proquest.com/docview/2533112942?pq-origsite=%requestingapplication%
PQID 2533112942
PQPubID 2032396
ParticipantIDs doaj_primary_oai_doaj_org_article_ddbbba3cc5634bab926bedbe02793b74
proquest_journals_2533112942
gale_infotracacademiconefile_A643395862
crossref_primary_10_3390_fi12100168
crossref_citationtrail_10_3390_fi12100168
PublicationCentury 2000
PublicationDate 2020-10-01
PublicationDateYYYYMMDD 2020-10-01
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Future internet
PublicationYear 2020
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_50
ref_92
Bostick (ref_80) 2018; 175
Qabajeh (ref_72) 2018; 29
ref_58
Gutierrez (ref_86) 2018; 15
Kumar (ref_91) 2020; 10
ref_13
ref_57
Kumar (ref_69) 2019; 17
ref_12
Amanor (ref_31) 2014; 5
ref_56
ref_11
ref_55
ref_10
ref_54
ref_53
ref_51
Shankar (ref_15) 2019; 14
Chiew (ref_14) 2018; 106
ref_16
ref_59
Singh (ref_23) 2007; 12
Hausken (ref_24) 2012; 8
ref_60
Hausken (ref_78) 2020; 11
ref_25
Chaudhary (ref_17) 2014; 2
ref_68
ref_67
Wang (ref_28) 2012; 45
Banday (ref_63) 2011; 12
Kleinrock (ref_29) 2011; 49
ref_62
Caputo (ref_34) 2014; 12
Mohammad (ref_20) 2015; 17
Dwyer (ref_66) 2017; 10
ref_27
ref_26
Hausken (ref_89) 2018; 29
Vidas (ref_49) 2013; Volume 7862
Verma (ref_90) 2020; 1
(ref_43) 2016; 2016
ref_71
ref_70
Suganya (ref_18) 2016; 139
Hong (ref_39) 2012; 55
ref_35
ref_33
ref_77
ref_76
Jakobsson (ref_32) 2007; 7
ref_30
ref_74
ref_73
Bakarich (ref_42) 2019; 14
Jain (ref_81) 2017; 2017
Goel (ref_85) 2018; 73
ref_37
Dakpa (ref_40) 2017; 163
Jakobsson (ref_41) 2019; 17
ref_83
ref_82
Krombholz (ref_22) 2015; 22
Nagunwa (ref_64) 2014; 3
ref_47
Bier (ref_79) 2019; 276
ref_46
ref_44
ref_88
ref_87
Sood (ref_65) 2011; 2011
Tankard (ref_38) 2011; 2011
ref_84
ref_1
Lin (ref_36) 2019; 26
ref_3
ref_2
Shar (ref_45) 2018; 45
Alghoul (ref_75) 2018; 2
Moore (ref_61) 2007; Volume 269
Atkins (ref_21) 2013; 1
ref_48
Hasan (ref_52) 2010; 2
Rader (ref_4) 2013; 5
ref_9
ref_8
Purkait (ref_19) 2012; 20
ref_5
ref_7
ref_6
References_xml – ident: ref_47
  doi: 10.1145/2872427.2883005
– volume: 12
  start-page: 76
  year: 2011
  ident: ref_63
  article-title: Phishing—A Growing Threat to E-Commerce
  publication-title: Bus. Rev.
– ident: ref_9
– volume: 163
  start-page: 5
  year: 2017
  ident: ref_40
  article-title: Study of Phishing Attacks and Preventions
  publication-title: Int. J. Comput. Appl.
– ident: ref_74
– ident: ref_5
– volume: 5
  start-page: 297
  year: 2014
  ident: ref_31
  article-title: Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices
  publication-title: J. Emerg. Trends Comput. Inf. Sci.
– ident: ref_26
– ident: ref_51
– ident: ref_16
  doi: 10.1109/SKIMA.2016.7916190
– volume: 3
  start-page: 72
  year: 2014
  ident: ref_64
  article-title: Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors
  publication-title: Int. J. Cyber-Secur. Digit. Forensics
– ident: ref_88
  doi: 10.1145/3290605.3300338
– ident: ref_30
  doi: 10.1109/ISSA.2016.7802935
– volume: 2
  start-page: 17
  year: 2010
  ident: ref_52
  article-title: Case Study On Social Engineering Techniques for Persuasion
  publication-title: Int. J. Appl. Graph Theory Wirel. Ad Hoc Netw. Sens. Netw.
– volume: 7
  start-page: 1
  year: 2007
  ident: ref_32
  article-title: The Human Factor in Phishing
  publication-title: Priv. Secur. Consum. Inf.
– ident: ref_35
  doi: 10.1145/2835375
– volume: 175
  start-page: 19
  year: 2018
  ident: ref_80
  article-title: Resilience science, policy and investment for civil infrastructure
  publication-title: Reliab. Eng. Syst. Saf.
  doi: 10.1016/j.ress.2018.02.025
– ident: ref_2
  doi: 10.1002/0470086106
– volume: 45
  start-page: 55
  year: 2018
  ident: ref_45
  article-title: Defending Against Cross Site Scripting Attacks
  publication-title: IEEE Comput. Soc.
  doi: 10.1109/MC.2011.261
– ident: ref_58
– volume: 8
  start-page: 355
  year: 2012
  ident: ref_24
  article-title: Review of systems defense and attack models
  publication-title: Int. J. Perform. Eng.
  doi: 10.23940/ijpe.12.4.p355.mag
– volume: 45
  start-page: 52
  year: 2012
  ident: ref_28
  article-title: Smartphone security challenges
  publication-title: Computer
  doi: 10.1109/MC.2012.288
– volume: 14
  start-page: 2171
  year: 2019
  ident: ref_15
  article-title: A Review on Phishing Attacks
  publication-title: Int. J. Appl. Eng. Res.
– ident: ref_8
– ident: ref_56
– ident: ref_77
  doi: 10.1007/s12046-020-01392-4
– ident: ref_27
– volume: 5
  start-page: 23
  year: 2013
  ident: ref_4
  article-title: Phishing Techniques and Mitigating the Associated Security Risks
  publication-title: Int. J. Netw. Secur. Appl.
– ident: ref_48
– ident: ref_87
  doi: 10.3390/g8020023
– ident: ref_10
– ident: ref_83
– volume: 11
  start-page: 100204
  year: 2020
  ident: ref_78
  article-title: Cyber resilience in firms, organizations and societies
  publication-title: Internet Things
  doi: 10.1016/j.iot.2020.100204
– volume: 276
  start-page: 626
  year: 2019
  ident: ref_79
  article-title: Risk analysis beyond vulnerability and resilience—Characterizing the defensibility of critical systems
  publication-title: Eur. J. Oper. Res.
  doi: 10.1016/j.ejor.2019.01.011
– ident: ref_92
  doi: 10.1016/S1361-3723(19)30060-0
– ident: ref_13
– ident: ref_7
  doi: 10.1016/S1361-3723(19)30025-9
– volume: 106
  start-page: 1
  year: 2018
  ident: ref_14
  article-title: A survey of phishing attacks: Their types, vectors and technical approaches
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2018.03.050
– volume: 2016
  start-page: 5
  year: 2016
  ident: ref_43
  article-title: The imitation game: How business email compromise scams are robbing organisations
  publication-title: Comput. Fraud Secur.
  doi: 10.1016/S1361-3723(16)30089-6
– volume: 2
  start-page: 8
  year: 2018
  ident: ref_75
  article-title: Email Classification Using Artificial Neural Network
  publication-title: Int. J. Acad. Eng. Res.
– volume: 20
  start-page: 382
  year: 2012
  ident: ref_19
  article-title: Phishing counter measures and their effectiveness—Literature review
  publication-title: Inf. Manag. Comput. Secur.
  doi: 10.1108/09685221211286548
– volume: 14
  start-page: A1
  year: 2019
  ident: ref_42
  article-title: Something Phish-y is Going On Here: A Teaching Case on Business Email Compromise
  publication-title: Curr. Issues Audit.
– ident: ref_53
– ident: ref_37
  doi: 10.1145/3025453.3025831
– volume: 2011
  start-page: 11
  year: 2011
  ident: ref_65
  article-title: Malvertising—Exploiting web advertising
  publication-title: Comput. Fraud Secur.
– ident: ref_76
– volume: 10
  start-page: 486
  year: 2020
  ident: ref_91
  article-title: A Novel Hybrid Approach of SVM Combined with NLP and Probabilistic Neural Network for Email Phishing
  publication-title: Int. J. Electr. Comput. Eng.
– volume: 55
  start-page: 74
  year: 2012
  ident: ref_39
  article-title: The Current State of Phishing Attacks
  publication-title: Commun. ACM
  doi: 10.1145/2063176.2063197
– ident: ref_3
– volume: 2017
  start-page: 5421046
  year: 2017
  ident: ref_81
  article-title: Phishing Detection: Analysis of Visual Similarity Based Approaches
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2017/5421046
– volume: 17
  start-page: 1
  year: 2015
  ident: ref_20
  article-title: Tutorial and critical analysis of phishing websites methods
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2015.04.001
– volume: 49
  start-page: 12
  year: 2011
  ident: ref_29
  article-title: Comments on ‘an early history of the internet’
  publication-title: IEEE Commun. Mag.
– ident: ref_11
– ident: ref_62
  doi: 10.1016/j.ress.2020.107224
– volume: 26
  start-page: 32
  year: 2019
  ident: ref_36
  article-title: Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content
  publication-title: ACM Trans. Comput. Interact.
– ident: ref_67
– ident: ref_68
  doi: 10.1109/CCNC.2015.7157981
– ident: ref_84
  doi: 10.1145/3349266.3351419
– volume: 15
  start-page: 988
  year: 2018
  ident: ref_86
  article-title: Learning from the Ones That Got Away: Detecting New Forms of Phishing Attacks
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2018.2864993
– ident: ref_44
– volume: Volume 7862
  start-page: 52
  year: 2013
  ident: ref_49
  article-title: QRishing: The susceptibility of smartphone users to QR code phishing attacks
  publication-title: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
– volume: 2
  start-page: 55
  year: 2014
  ident: ref_17
  article-title: Development Review on Phishing: A Computer Security Threat
  publication-title: Int. J. Adv. Res. Comput. Sci. Manag. Stud.
– ident: ref_73
– volume: 1
  start-page: 1
  year: 2020
  ident: ref_90
  article-title: Email Phishing: Text Classification Using Natural Language Processing
  publication-title: Comput. Sci. Inf. Technol.
  doi: 10.11591/csit.v1i1.pp1-12
– ident: ref_71
  doi: 10.1109/TDSC.2019.2956035
– ident: ref_55
  doi: 10.1145/1772690.1772720
– volume: 1
  start-page: 23
  year: 2013
  ident: ref_21
  article-title: A Study of Social Engineering in Online Frauds
  publication-title: Open J. Soc. Sci.
– volume: 2011
  start-page: 16
  year: 2011
  ident: ref_38
  article-title: Advanced Persistent threats and how to monitor and deter them
  publication-title: Netw. Secur.
  doi: 10.1016/S1353-4858(11)70086-1
– volume: 12
  start-page: 28
  year: 2014
  ident: ref_34
  article-title: Going spear phishing: Exploring embedded training and awareness
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSP.2013.106
– ident: ref_6
– volume: 73
  start-page: 519
  year: 2018
  ident: ref_85
  article-title: Mobile Phishing Attacks and Defence Mechanisms: State of Art and Open Research Challenges
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2017.12.006
– ident: ref_25
– ident: ref_50
– ident: ref_59
  doi: 10.1109/MALWARE.2008.4690854
– volume: Volume 269
  start-page: 1
  year: 2007
  ident: ref_61
  article-title: Examining the impact of website take-down on phishing
  publication-title: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit on—eCrime ’07
– ident: ref_33
  doi: 10.1109/BigData.2018.8622505
– ident: ref_46
– ident: ref_12
– volume: 139
  start-page: 20
  year: 2016
  ident: ref_18
  article-title: A Review on Phishing Attacks and Various Anti Phishing Techniques
  publication-title: Int. J. Comput. Appl.
– ident: ref_54
  doi: 10.1145/1240624.1240760
– volume: 17
  start-page: 18
  year: 2019
  ident: ref_69
  article-title: Emerging Threats in Internet of Things Voice Services
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSEC.2019.2910013
– volume: 22
  start-page: 113
  year: 2015
  ident: ref_22
  article-title: Advanced social engineering attacks
  publication-title: J. Inf. Secur. Appl.
– volume: 10
  start-page: 29
  year: 2017
  ident: ref_66
  article-title: Malvertising—A Rising Threat to The Online Ecosystem
  publication-title: J. Inf. Syst. Appl. Res.
– ident: ref_70
– ident: ref_82
  doi: 10.1016/S1361-3723(19)30025-9
– volume: 12
  start-page: 1
  year: 2007
  ident: ref_23
  article-title: Online Frauds in Banks with Phishing
  publication-title: J. Internet Bank. Commer.
– volume: 17
  start-page: 68
  year: 2019
  ident: ref_41
  article-title: The Rising Threat of Launchpad Attacks
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSEC.2019.2922865
– ident: ref_60
– volume: 29
  start-page: 111
  year: 2018
  ident: ref_89
  article-title: A cost–benefit analysis of terrorist attacks
  publication-title: Def. Peace Econ.
  doi: 10.1080/10242694.2016.1158440
– ident: ref_1
  doi: 10.1007/978-3-642-04117-4
– ident: ref_57
– volume: 29
  start-page: 44
  year: 2018
  ident: ref_72
  article-title: A recent review of conventional vs. automated cybersecurity anti-phishing techniques
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2018.05.003
SSID ssj0000392667
Score 2.5440686
SecondaryResourceType review_article
Snippet Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 168
SubjectTerms Analysis
Black markets
Cybercrime
Data security
Electronic mail systems
Identity theft
Informal economy
Internet
Literature reviews
Malware
Net losses
Personal information
Phishing
phishing attacks
phishing technical approaches
phishing types
phishing vectors
Power
Security management
Software services
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3bS8MwFMaDDB_0QbzidEpAQQTLuqbpxbcqDh9kDNSxt5BbcSBV1m7gf-85aTcnKL5IX0oJJT2nSb4vJL8Qci4jwxLfhh7C2cGgSOUpkPVewBB3HjCZOxLT6CEeDJLxOB2uHPWFa8JqPHAduK4xSinJtOYRC5VUaRApa5QFO5UyFTsSKKieFTPl-mAY9qMornmkDHx9N58gKgsETvJtBHKg_t-6YzfG9LfJViMOaVZXaoes2WKXbK4gA_dINnypZ41oVlW4P54-zqZz-3FN0VGWV3TkpuHhRhaGuolzTAPNGna4LffJc__u6fbea45B8DQ0sMpjGi6pDE8M49ZneQouB5RKEjPuM8RH5SA6eNjTgYYmqkxoeBTLhEujQMAZdkBaxVthDwntaRCA0lcQuTy0vpG93Giu4YUpKL3EtsnlIjRCN4xwPKriVYBXwDCKrzC2ydmy7HtNxvix1A1GeFkCadbuAeRYNDkWf-W4TS4wPwLbHFRHy2brAHwU0qtEBrKKpRzMWZt0FikUTWMsRQCSFmVlGBz9R22OyUaAptut6OuQVjWd2ROyrufVpJyeuv_wE9Yg4Vk
  priority: 102
  providerName: Directory of Open Access Journals
Title Phishing Attacks Survey: Types, Vectors, and Technical Approaches
URI https://www.proquest.com/docview/2533112942
https://doaj.org/article/ddbbba3cc5634bab926bedbe02793b74
Volume 12
WOSCitedRecordID wos000585335900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: DOA
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: M~E
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ABI/INFORM Collection
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: 7WY
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/abicomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ABI/INFORM Global (OCUL)
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: M0C
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/abiglobal
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: P5Z
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: K7-
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1999-5903
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000392667
  issn: 1999-5903
  databaseCode: PIMPY
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La9wwEB6ax6E99F26bboYWiiBmNiW5UcvxQkJCWkWkzRpkovQy81C2E3X3oX--85otZsW2lyKwRhLGNmjkb5vLH0D8EFmhhWRTUMSZ0eCIlWoENaHCSO584TJxikxnX_JB4Pi4qKsfcCt9csqF2OiG6jNWFOMfDtBXELYIE0-3_4IKWsU_V31KTRWYC1Okpj6-VEeLmMsEU7-WZbPVUkZsvvtZkiCWQhzij_mISfX_69B2c00-0_-t41P4bHHmEE17xTP4IEdPYdHvykPvoCqvp4Hn4Kq62ibfXA6nczsz08BEdN2Kzh30Xy8kCMTuPg7WTOovAS5bV_C2f7e192D0GdTCDX6aRcyjYdUhheGcRuxpkSyhICnyBmPGKlQNYhdeBrrRKOnK5ManuWy4NIoxIGGvYLV0XhkX0MQa8SRMlIlU01qIyPjxmiu8YElAsbC9mBz8W2F9lLjlPHiRiDlIDuIOzv04P2y7u1cYOOvtXbIRMsaJIrtbown34X3MWGMUkoyrXnGUiUVGl9Zoywyb2xpnvbgIxlYkOtic7T0OxDwpUgES1SIzljJkeP1YGNhYOF9uhV31n1zf_FbeJgQK3dL_jZgtZtM7TtY17Nu2E76sJJ_u-zD2s7eoD7puxhA33VbPB9Hu3iu-RWW14fH9eUvDVr0VQ
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1ba9RAFD7UKqgP9Y5rqwZURGhodi65CCKxWlq6LgVr6ds4t7QF2a2btNI_1d_YcybJVkF964PkJWSGIZP5cs535vIdgJc6dTxPvIhJnB0DFG1ig7Q-ZpzkzhnXVVBi2htl43G-v1_sLMB5fxaGtlX2NjEYaje1NEe-xpCXEDcQ7P3xj5iyRtHqap9Co4XFtj_7iSFb_W7rI47vK8Y2Pu2ub8ZdVoHYIl6bmFu8tHEyd1z6hFcFBg3o-POMy4STGlOFPlyKoWUWEW-ccDLNdC61M8iHHMd2r8F1IbCQtgom6_M5nQTJRppmrQoq50WyVh2RQBfSqvw3vxfSA_zNCQTPtnHnf_smd2Gp49BR2YL-Hiz4yX24_Yuy4gModw7bybWobBqSEYi-nMxO_dnbiALvejXaC6sVeKMnLgrrC4TWqOwk1n39EL5eSR8eweJkOvGPIRpa5Mk6MQU3lfCJ08PKWWmxwQIJce4H8KYfS2U7KXXK6PFdYUhF464ux30AL-Z1j1sBkT_W-kCQmNcg0e_wYDo7UJ0NUc4ZYzS3VqZcGG0QbMY74xOGRtZkYgCvCVCKTBO-jtXdCQvsFIl8qRLZJy8kxrADWOkBpTqbVatLND35d_FzuLm5-3mkRlvj7WW4xWgGImxvXIHFZnbin8INe9oc1bNn4feI4NtVY-8CpV5Hlw
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1ba9RAFD7UKqIP9dbiatUBFREMm53J5CKIROti2bIsqKVv49yiBdmtm7TSv9Zf5zmTZKugvvVB8hKSYchkvjnnO3P5DsATnTqRxz6JSJwdAxRtIoO0PuKC5M650FVQYtrfy6bT_OCgmK3BWX8WhrZV9jYxGGq3sDRHPuTIS4gbJHxYddsiZjvj10ffI8ogRSutfTqNFiITf_oDw7f61e4O9vVTzsfvPr59H3UZBiKL2G0iYfHSxsncCeljURUYQCAJyDMhY0HKTBX6c5mMLLeIfuMSJ9NM51I7g9zICaz3ElxGLyxpjE2yaDW_EyPxSNOsVUQVooiH1SGJdSHFyn_zgSFVwN8cQvBy4xv_8_-5CRsdt2ZlOxhuwZqf34brvygu3oFy9rWddGNl05C8APtwvDzxpy8ZBeT1C7YfVjHwRs8dC-sOhGJWdtLrvt6ETxfShi1Yny_m_i6wkUX-rGNTCFMlPnZ6VDkrLVZYIFHO_QCe9_2qbCexTpk-vikMtQgD6hwDA3i8KnvUCov8sdQbgseqBImBhweL5RfV2RblnDFGC2tlKhKjDQLPeGd8zNH4miwZwDMClyKThZ9jdXfyAhtF4l-qRFYqComx7QC2e3CpzpbV6hxZ9_79-hFcRcipvd3p5D5c4zQxEXY9bsN6szz2D-CKPWkO6-XDMFIYfL5o6P0EzytQPQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Phishing+Attacks+Survey%3A+Types%2C+Vectors%2C+and+Technical+Approaches&rft.jtitle=Future+internet&rft.au=Rana+Alabdan&rft.date=2020-10-01&rft.pub=MDPI+AG&rft.eissn=1999-5903&rft.volume=12&rft.issue=10&rft.spage=168&rft_id=info:doi/10.3390%2Ffi12100168&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1999-5903&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1999-5903&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1999-5903&client=summon