Title :
A phishing vulnerability analysis of web based systems
Author :
Yu, Weider D. ; Nargundkar, Shruti ; Tiruthani, Nagapriya
Author_Institution :
Dept. of Comput. Eng., San Jose State Univ., San Jose, CA
Abstract :
Phishing, a criminal act of collecting personal, bank and credit card information by sending out forged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are constantly on the rise. The impact of phishing is quite drastic since it involves the threat of identity theft and financial losses. A lot of groups and organizations are trying to study this act and also inform and update the public on what are the latest tactics being used in the phishing sector. According to industry estimates, phishing attacks are on the rise every year and the existing anti phishing solutions fall short in detecting phishing. Moreover, phishers come up with innovative methods of phishing everyday making it even more difficult to detect and prevent phishing. This paper explains in detail the various methods used in phishing. We perform a root-cause analysis of the methods used in phishing, the motivation for phishing and in the process come up with a fishbone diagram outlining the causes and methodologies used in phishing. This analysis is aimed at helping developers to design and develop better anti phishing solutions.
Keywords :
Internet; computer crime; data privacy; fraud; Web based systems; antiphishing solutions; bank information; credit card information; criminal act; fake Websites; financial losses; forged e-mails; identity theft; personal information; phishing attacks; phishing vulnerability analysis; root-cause analysis; Cause effect analysis; Computer crime; Credit cards; Electronic mail; Information analysis; Performance analysis; Sections; Silicon; Toy industry;
Conference_Titel :
Computers and Communications, 2008. ISCC 2008. IEEE Symposium on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-2702-4
Electronic_ISBN :
1530-1346
DOI :
10.1109/ISCC.2008.4625681