REVIEW PAPER ON PHISHING ATTACKS
Aathi oli .S Mohammed Raeesul irfan C. Vijayalakshmi
B. S. Abdur Rahman Crescent Institute Of Science And Technology
Phishing may be a cybercrime, which involves luring the user into providing sensitive and confidential informa- tion to the attacker. the data could include mastercard details, username and passwords, bank details, etc. After obtaining the knowledge, the attacker could commit crimes like financial losses and identity thefts. The target might be a private, a corporation or a cluster in a company. This paper provides an evidence on phishing attacks to make awareness and several other countermeasures to beat them.
Keywords: Phishing, deceptive and spear phishing, whaling, pharming, anti-phishing techniques.
A field of knowledge Technology is Cyber Security that aims at the protection of knowledge, systems, network, etc., from the varied attacks. Cyber Security is one in all the key concerns in today’s information technology world. It also aims at the prevention of unauthorized access to sensitive data. Data is prone to various attacks while in transit and while stored. These attacks, both existing and upcoming, pose a wonderful threat to industries and individuals. Since, industries rely heavily on computers for his or her functionalities, confidential and sensitive information must be protected. Various Cyber Security techniques and tools provide this protection of knowledge while it’s stored and in transit.
The threats and vulnerabilities, together with the value of detecting and fixing the bugs, have consistently been increasing over the past 20 years. This has led to loss of holding, loss of reputation and revenue, transmission of security vulnerabilities, etc. the price encountered for overcoming such security attacks have escalated from $27.4 billion to $66 billion in eight years.
The attackers use various methods like loophole in applications as gateway to require advantage of the vulnerabilities, which help them to understand unauthorized access to sensitive data.
Phishing involves sending fraudulent emails to a target that appear to come back from a creditable source. a private or several individuals called phishers or attackers orchestrate the attack. The individuals who are stricken by the attack are called victims or targets. The goal of phishing is to collect sensitive data, like login credentials or checking account details or install malware into the target’s system. Investigating such a fancy attack is extremely challenging to the cybersecurity experts. Phishing attacks are often performed manually but to over- come the attack and to reply effectively to the attack requires a lot of some time , intelligence and manpower. this could take days or perhaps weeks to reply and analyze the attack thorough. Manual investigation has lot of dependency on the safety analyst’s talents and tools avail- able for investigation. Moreover, these manual investigations get it wrong because of human errors.
Commonly called the Amazon Prime Day phishing attack, the knowledge of the shoppers of Amazon was compromised by a phishing attack. All the Amazon Prime members received an email that consisted of seemingly legitimate deals to them. On trying to get the ‘deals’, the transaction would fail, promoting the attackers to achieve sensitive information on the user.
Another common example is Google Docs invitation. In May 2017, attackers sent fraudulent invitations to google users across the globe to edit documents. When the recipients clicked the invitation, it led to a third party app that facilitated attackers to urge tip .
2. PHISHING MECHANISM
The motive of phishing attack is to govern the attacker into providing lead about him/her. To perform such an attack, the attacker or phisher mimics a legitimate website. To mimic the web- site, he/she constructs a malicious site employing a phishing website. This phishing website would gather all the in- formation on the target and provide it to the attacker . Usually, the targets are unable to differentiate between genuine and phishing websites causing them to constitute the traps set by the phisher.
 Akbarzhon Madaminov, “Recommendation Systems”, Engpaper Journal, https://www.engpaper.com/recommendation-systems.htm
 Aathi oli.S , “REVIEW PAPER ON PHISHING ATTACKS”, Engpaper Journal, https://www.engpaper.com/review-paper-on-phishing-attacks.htm
 Rania Fernando, “IoT based – Street Light Controlling System”, Engpaper Journal, https://www.engpaper.com/iot-based-street-light-controlling-system.htm
 K. SAI BHARGAV, V. RAJENDRA, “Study on Data Structures for Machine Learning”, Engpaper Journal, https://www.engpaper.com/data-structures-for-machine-learning.htm
Brundha P, Guruprasad K N, Amith V Hiremath,Sirisha R, Chandrakanth G Pujari , “Face Detection Based Smart Attendance System Using Haar Cascade Algorithm”, Engpaper Journal, https://www.engpaper.com/face-detection-based-smart-attendance-system.htm
 Afsana Nadaf , “RFID BASED LIBRARY MANAGEMENT SYSTEM”, Engpaper Journal, https://www.engpaper.com/rfid-based-library-management-system.htm
 Mr. Vedant Thube, Neha Thakur, Mr. Siddhesh Balsaraf,Ms. Priyanka Hanchate, Dr. S. D. Sawarkar , “Accident Prevention using Eye Drowsiness & Yawning Detection”, Engpaper Journal, https://www.engpaper.com/accident-prevention-paper.htm
 Abhishek A Hishobkar, Rutuja Gaonkar, Jagdish Chintamani , “DIGITAL DIARY”, Engpaper Journal, https://www.engpaper.com/digital-diary.htm
 Pooman Suryavanshi, Aryan Ghadge, Manali Kharat , “TAXI SERVICE for VISUALLY IMPAIRED”, Engpaper Journal, https://www.engpaper.com/taxi-service-for-visually-impaired.htm
 Mr. Pankaj yadav, Shila Jawale, Mr. Ashutosh Mahadik, Ms. Neha Nivalkar, Dr. S. D. Sawarkar , “NEWS ARTICLES CLASSIFICATION”, Engpaper Journal, https://www.engpaper.com/news-articles-classification.htm
 Rahul Chavan, Manvee Bhoir, Gaurav Sapkale, Anita Mhatre, “Smart Tourist Guide System”, Engpaper Journal, https://www.engpaper.com/smart-tourist-guide-system.htm
 Rutik Desai, Akash Jadhav,Suraj Sawant ,Neha Thakur , “Accident Detection Using ML and AI Techniques”, Engpaper Journal, https://www.engpaper.com/accident-detection-using-ml-and-ai-techniques.htm
 Anagha Vishe,Akash Shirsath, Sayali Gujar, Neha Thakur , “Student Attendance System using Face Recognition”, Engpaper Journal, https://www.engpaper.com/student-attendance-system-using-face-recognition.htm
 Ms.Sayali Patekar, Shila jawale, Ms.Pranali Kurhade, Mr.Shubham Khamkar , “Smart Classroom Application”, Engpaper Journal, https://www.engpaper.com/smart-classroom-application.htm
 DOSHI SAKSHI, DEVYANI CHAUDHARI, POOJA GAIKWAD, RUTUJA CHABUKSWAR,MRS. SUJATA KOLHE, “TOURISM SIMPLIFIED THROUGH VOICE”, Engpaper Journal, https://www.engpaper.com/tourism-simplified-through-voice.htm
 Afreen Fathima,Samreen Jameel, Pathan Ahmed khan , “ACCIDENT DETECTION AND ALERTING SYSTEM”, Engpaper Journal, https://www.engpaper.com/accident-detection-and-alerting-system.htm
 Suman Zareen, Tuba Masood, Pathan Ahmed khan, “E-Commerce Web Application with Augmented Reality”, Engpaper Journal, https://www.engpaper.com/e-commerce-web-application-with-augmented-reality.htm
 Lok Shan CHAN, “Selection of Waterfall and Agile Methodologies in Software Testing”, Engpaper Journal, https://www.engpaper.com/selection-of-waterfall-and-agile-methodologies-in-software-testing.htm
 Barve Rutu, “CLOUD COMPUTING SYSTEM FOR GAMING”, Engpaper Journal, https://www.engpaper.com/cloud-computing-system-for-gaming.htm
 Harshvardhan Singh, “Machine Learning: Fake News Blocking”, Engpaper Journal, https://www.engpaper.com/machine-learning-fake-news-blocking.htm
 M.Al Batahari, “SERVERS ROOM MONITORING SYSTEM USING IOT”, Engpaper Journal, https://www.engpaper.com/servers-room-monitoring-system-using-iot.htm
 AYUSHI ANKITA RAKSHIT, “VIRTUAL MASTER USING PYTHON”, Engpaper Journal, https://www.engpaper.com/virtual-master-using-python.htm
 Baldeep Kaur, “REAL TIME SLEEP DROWSINESS DETECTION USING FACE RECOGNITION”, Engpaper Journal, https://www.engpaper.com/real-time-sleep-drowsiness-detection-using-face-recognition.htm
 Suchitav Khadanga, “Two Stage CMOS Operational Amplifier From Specification to Design”, Engpaper Journal, https://www.engpaper.com/opamp-operational-amplifier-design.htm
 nidhi sharma, “Introduction to Remote Sensing”, Engpaper Journal, https://www.engpaper.com/introduction-to-remote-sensing.htm
 Rohith N Reddy, “COVID-19 Detection using SVM Classifier”, Engpaper Journal, https://www.engpaper.com/covid-19-detection-using-svm-classifier.htm
 Swapnil Kole, “COVID-19 Database on Consortium Blockchain”, Engpaper Journal, https://www.engpaper.com/covid-19-database-on-consortium-blockchain.htm
 TejalLengare, PallaviSonawane, PrachiGunjal, ShubhamDhire, Prof.Shaikh.J.N , “Accident Detection & Avoidance System in Vehicles”, Engpaper Journal, https://www.engpaper.com/accident-detection-and-avoidance-system-in-vehicles.htm
 Abhishek Pawshekar, Deepti More, Akash Khade, Pratiksha Wagh, Ganesh Ubale, “Augmented Reality: to converting and placing object into 3D model”, Engpaper Journal, https://www.engpaper.com/augmented-reality-survey.htm
 ABDUL KHADER.A.S, A.R.PRADEEP, Dr.T.V.Mallesh, S.R.Ramesh, “PARAMETRIC BEHAVIOUR OF BOX GIRDER BRIDGES UNDER DIFFERENT RADIUS OF CURVATURE & VARYING SPANS”, Engpaper Journal, https://www.engpaper.com/parametric-behaviour-of-box-girder-bridges.htm
 Prof.Ubale.G.S, Pranjal Adhav,Pooja Gaikwad, Sushama Nadavade ,Pooja Kale , “Iot based Bridge Monitoring System”, Engpaper Journal, https://www.engpaper.com/iot-based-bridge-monitoring-system.htm
 Divya Deewan, Priyanka Maheshwari, Sanjay Jain, “A REVIEW OF BATTERY-SUPERCAPACITOR HYBRID ENERGY STORAGE SYSTEM SCHEMES FOR POWER SYSTEM APPLICATION”, Engpaper Journal, https://www.engpaper.com/hybrid-energy-storage-system-schemes-for-power-system-application.htm
 Prof.Ansari.M.B, Pranjal Adhav,Pooja Gaikwad,Sushama Nadavade,Pooja Kale, “Survey on MyHelper IOT based Bridge Monitoring System”, Engpaper Journal, https://www.engpaper.com/survey-on-myhelper-iot-based-bridge-monitoring-system.htm
 Shreyas.S.J, Saddam hussain, Chaithra E, “COMPARATIVE STUDY ON SEISMIC RESPONSE OF MASONRY INFILLED RC FRAME BUILDINGS AND MIVAN BUILDINGS WITH DIFFERENT PERCENTAGE OF WALL OPENINGS”, Engpaper Journal, https://www.engpaper.com/seismic-response-of-masonry-infilled-rc-frame-buildings-and-mivan-buildings.htm
 Yusuf Ali Hassan, “Somali Power-Grid Significant Challenges”, Engpaper Journal, https://www.engpaper.com/somali-power-grid-significant-challenges.htm
 Ahmed N. Elhefnawy, “Refractive IR Objective Optical Design Operating in LWIR band For Military Observation Applications”, Engpaper Journal, https://www.engpaper.com/refractive-ir-objective-optical-design.htm
 S MANJULA, D SELVATHI and SUCHITAV KHADANGA, “Design of low-power CMOS transceiver front end for 2.4-GHz WPAN applications”, Engpaper Journal, https://www.engpaper.com/low-power-cmos-transceiver-front-end.htm
 Suchitav Khadanga, “Fabrication of MEMS Pressure Sensor on thin film membrane”, Engpaper Journal, https://www.engpaper.com/fabrication-of-mems-pressure-sensor-on-thin-film-membrane.htm
 Suchitav Khadanga and Dr. K.R.Suresh Nair, “An Introduction to Bluetooth”, Engpaper Journal, https://www.engpaper.com/an-introduction-to-bluetooth.htm
 Suchitav Khadanga and S. Ahmad, “DESIGN AND FABRICATION OF LOW COST MICROWAVE OSCILLATOR”, Engpaper Journal, https://www.engpaper.com/design-and-fabrication-of-low-cost-microwave-oscillator.htm
 Ameen Ahmed, Noushad S, Suchitav Khadanga, K.R.Suresh Nair, P.K.Radhakrishnan, “DEVELOPMENT OF LOW PHASE NOISE SMALL FOOT PRINT SURFACE MOUNT VOLTAGE CONTROLLED OSCILLATOR”, Engpaper Journal, https://www.engpaper.com/development-of-low-phase-noise-small-foot-print-surface-mount-voltage-controlled-oscillator.htm
 Suchitav Khadanga , “Synchronous programmable divider design for PLL Using 0.18 um cmos technology”, Engpaper Journal, https://www.engpaper.com/synchronous-programmable-divider-design-for-pll.htm
 Kavya.G.R, Shivaraju.G.D, Dr. T V Mallesh, S R Ramesh, “PROGRESSIVE COLLAPSE RESISTANCE OF FLAT SLAB BUILDING”, Engpaper Journal, https://www.engpaper.com/progressive-collapse-resistance-of-flat-slab-building.htm Copyright protected @ ENGPAPER.COM and AUTHORS https://www.engpaper.com