Analysis of Phishing Attacks and Countermeasures

Biju Issac, Raymond Chiong, Seibu Mary Jacob

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

One of the biggest problems with the Internet technology is the unwanted spam emails. The well disguised phishing email comes in as part of the spam and makes its entry into the inbox quite frequently nowadays. While phishing is normally considered a consumer issue, the fraudulent tactics the phishers use are now intimidating the corporate sector as well. In this paper, we analyze the various aspects of phishing attacks and draw on some possible defenses as countermeasures. We initially address the different forms of phishing attacks in theory, and then look at some examples of attacks in practice, along with their common defenses. We also highlight some recent statistical data on phishing scam to project the seriousness of the problem. Finally, some specific phishing countermeasures at both the user level and the organization level are listed, and a multi-layered anti-phishing proposal is presented to round up our studies.
Original languageEnglish
Title of host publicationManaging Information in the Digital Economy
Subtitle of host publicationIssues and Solutions - Proceedings of the 6th International Business Information Management Association Conference, IBIMA 2006
PublisherInternational Business Information Management Association, IBIMA
Pages339-346
Number of pages8
ISBN (Print)9780975339350
Publication statusPublished - 17 Jun 2006
Externally publishedYes
Event6th International Business Information Management Association Conference, IBIMA 2006 - Bonn, Germany
Duration: 19 Jun 200621 Jun 2006

Conference

Conference6th International Business Information Management Association Conference, IBIMA 2006
Country/TerritoryGermany
CityBonn
Period19/06/0621/06/06

Keywords

  • cs.CR

Fingerprint

Dive into the research topics of 'Analysis of Phishing Attacks and Countermeasures'. Together they form a unique fingerprint.

Cite this