Phishing Attacks and Counter Measures

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-25 Number-1
Year of Publication : 2015
Authors : Sophia Kingsley Okore, Benisemeni Zakka
DOI :  10.14445/22312803/IJCTT-V25P104


Sophia Kingsley Okore, Benisemeni Zakka"Phishing Attacks and Counter Measures". International Journal of Computer Trends and Technology (IJCTT) V25(1):23-28, July 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Phishing is a term used to describe various scams that use fraudulent e-mail messages, sent by criminals, to trick people into exposing personal information. The criminals use this information identity to rob bank account, or take over computers. Counterfeit web sites, using “hijacked” company brands and logos are created to lure individuals into revealing information that are confidential. These digital thugs are “phishing” for any data they can obtain to prey on people and further their criminal activities. E-mail has become an invaluable communication tool, both for business and personal use. Among the many security issues that affect computer users, there is a rapidly growing threat known as “phishing”. Criminals use phishing attacks to lure the unsuspecting into visiting a fraudulent web site, calling a fraudulent phone number, or downloading malicious software, expressly to steal sensitive information such as credit card numbers, account credentials, social security numbers, PINS, or passwords. Phishing e-mails are only a small aspect of the overall phishing economy and up till now, the only aspect seen by most people. The phishing economy is decentralized and self- organized social network of merchants and consumers governed by laws of demand and supply.

[1] security-cx_ag_1228phish.html
[2] Anti-Phishing Working Group. Phishing Activity Trends Report November 2005 (2005).
[3] Anti-Phishing Working Group Phishing Archive. http://antihishing. org/phishing_archive.htm
[4] Why Phishing Works: Rachna Dhamija, Conference on Human Factors in Computing Systems, April 2006
[5] Phishing: An Analysis of a Growing Problem, Anthony Elledge. SANS Institute InfoSec Reading Room January 2007
[6] The Evolution of Phishing Attacks: Kasperskey Lab 2011-2013
[7] A framework for detection and measurement of phishing attacks, Chou et al. 2004, Sujata Garera et al.
[8] Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why Phishing Works. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Canada, pp. 581-590. Retrieved October 29, 2007, from ACM Digital Library.
[9] Berghel, H., Carpinter, J., & Jo, J.-Y. (2007). Phish Phactors: Offensive and Defensive Strategies. Advances in Computers, 70, 223-268. Retrieved November 3, 2007, from Web of Science database
[10] Camenisch, J., Shelat, A., Sommer, D., & Zimmerman, R. (2006). Securing User Inputs for the Web. Proceedings of the Second ACM Workshop on Digital Identity Management, USA, pp. 33-44. Retrieved October 28, 2007, from ACM Digital Library.
[11] Wu, M., Miller, R. C., & Garfinkel, S. L. (2006). Do Security Toolbars Actually Prevent Phishing Attacks? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Canada, pp. 601-610. Retrieved October 28, 2007, from ACM Digital Library.
[12] Milletary, J. (2005). Technical Trends in Phishing Attacks. Retrieved December 1, 2007, from http://www.uscert. gov/reading_room/phishing_trends0511.pdf
[13] Anti-Phishing Working Group. (2007). What is Phishing and Pharming? Retrieved December 1, 2007, from ar04.pdf
[14] Web Identity Security: Advanced Phishing Attacks And Counter Measures, Anthony Yingjie Fu City University Of Hong Kong September 2006
[15] Enhancing Home Computer User Information Security: Factors to Consider in the Design of Anti-phishing Applications, Melinda Geist ,Intel Corporation Febuary 2008
[16] International Journal of Advanced Research in Computer Science and Software Engineering Jyoti et al.3(5), May - 2013, pp. 458-465
[17] Jakobsson, M. (2007). The Human Factor in Phishing. Retrieved November 21, 2007, from Indiana University, School of Informatics Web site:
[18] Techniques on Phishing and Counter measures Muhammad Khalil and Marcus Wolffl Fall 2008