Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
نویسندگان
چکیده
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. websites bear striking resemblance their legitimate counterparts, thus rendering them inconspicuous challenging for an unsuspecting identify. Criminals phishing experts frequently leverage cloaking mechanisms evade detection software web crawlers. This paper provides comprehensive systematic review of primary studies conducted between 2012 2022 on using techniques anti-phishing entities based data extracted from Scopus, Web Science, Google Scholar. Different server-side client-side strategies, mechanisms, toolkits, blacklists, or ecosystems, such concepts have been taken as thematic outputs the study discussed in detail. literature (SLR) is one first reviews be analyzing current evasion used phishers, limitations outlined well.
منابع مشابه
Detection and Prediction of Phishing Websites using Classification Mining Techniques
Phishing is serious web security problem that involves mimicking legitimate websites to deceive online users in order to steal their sensitive information. Phishing can be seen as a typical classification problem in data mining where the classifier is constructed from large number of website’s features.There are high demands on identifying the best set of features that when mined the predictive...
متن کاملA Review on Phishing Attacks and Various Anti Phishing Techniques
Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques...
متن کاملfrom linguistics to literature: a linguistic approach to the study of linguistic deviations in the turkish divan of shahriar
chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...
15 صفحه اولA Systematic Review of Methods Used to Assess Mid-Palatal Suture Maturation
Objectives Use of a reliable method to determine the degree of skeletal development of the mid-palatal suture is important in the choice of treatment between orthopedic maxillary expansion and surgical expansion in adolescents and young adults. The aim of this study was to review the new methods for evaluation of mid-palatal suture maturation. Methods Electronic search was conducted in PubMed ...
متن کاملA Hybrid Approach to Detect Zero Day Phishing Websites
Phishing is a significant problem that tricks unsuspecting users into revealing private information involving fraudulent email and websites. This causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based on phishing blacklists and phishing properties. We used some fresh phish from PhishTank that were recently added to test that it can be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3293063