• DocumentCode
    1819969
  • Title

    Browser-Side Countermeasures for Deceptive Phishing Attack

  • Author

    Huang, Huajun ; Zhong, Shaohong ; Tan, Junshan

  • Author_Institution
    Coll. of Comput. Sci., Central South Univ. of Forestry & Technol., Changsha, China
  • Volume
    1
  • fYear
    2009
  • fDate
    18-20 Aug. 2009
  • Firstpage
    352
  • Lastpage
    355
  • Abstract
    Phishing is a form of online identity theft. Phishers use social engineering to steal victims´ personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit Websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.
  • Keywords
    Web sites; computer crime; online front-ends; unsolicited e-mail; account username; antiphishing; browser-side countermeasure; counterfeit Website; credit card number; deceptive phishing attack; financial account credential; online identity theft; password; personal identity data; social engineering; social security number; spoofed e-mail; Computer science; Computer security; Counterfeiting; Credit cards; Data engineering; Data security; Educational institutions; Forestry; Information security; Invasive software; anti-phishing; browser-side; deceptive; identity theft; phishing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
  • Conference_Location
    Xi´an
  • Print_ISBN
    978-0-7695-3744-3
  • Type

    conf

  • DOI
    10.1109/IAS.2009.12
  • Filename
    5284029