|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Phishing is a technique used by hackers or attackers to trick users into inserting their sensitive credentials such as usernames, passwords, and credit card details into an unauthenticated entity, such as such as website. In this type of attack, unauthenticated entities disguise themselves as authentic and trusted entities. Sources are fooled by the look and feel of the fake website which closely resembles the legitimate website. Phishing is a type of cybercriminal that tries to get important or confidential information from users, this is usually achieved by creating a fake website that mimics a legitimate website. Phishing attacks use a variety of techniques such as link manipulation, filter avoidance, site spoofing, hidden redirects, and social engineering. Scammers use social engineering to trick victims or set up fake websites to steal personal and organizational information such as account IDs, usernames, and passwords.
Keyword
Phishing, Personal information, Machine Learning, Malicious links, Phishing domain characteristics.
PDF Download (click here)
|
|
|
|
|