A survey of phishing attacks: Their types, vectors and technical approaches
نویسندگان
چکیده
منابع مشابه
A survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملVectors: a survey of molecular cloning vectors and their uses.
Thank you very much for downloading vectors a survey of molecular cloning vectors and their uses. As you may know, people have search numerous times for their chosen books like this vectors a survey of molecular cloning vectors and their uses, but end up in malicious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside...
متن کاملA Phishing Model and Its Applications to Evaluating Phishing Attacks
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. In this paper, we present a theoretical yet practical model to study this threat in a formal manner. While it is folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has n...
متن کاملA Review on Phishing Attacks and Various Anti Phishing Techniques
Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Expert Systems with Applications
سال: 2018
ISSN: 0957-4174
DOI: 10.1016/j.eswa.2018.03.050