Phishing Attack and Its Detections and Prevention Techniques

[{“box”:0,”content”:”

n

Year : September 25, 2023 | Volume : 01 | Issue : 02 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Syeda Wajiha Zahra, Muhammad Nadeem, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed

  1. [/foreach]

    n

n

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Department of Computer Science, Alhamd Islamic University, Department of Computer Science and Technology, University of Science and Technology Beijing, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, National University of Technology, Department of Computer Science, National University of Technology, Department of Computer Science, Alhamd Islamic University, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan
  2. n[/if 1175][/foreach]

n

n

Abstract

nThe relentless surge of cyber threats represents a pressing challenge to global security and individual privacy. Among these, phishing attacks remain a particularly pernicious form of cybercrime. This paper provides a comprehensive review of phishing attacks, their evolution, methodologies, impacts, and countermeasures. The methods of perpetrating phishing attacks have grown in sophistication, extending beyond the common email phishing to include spear phishing, whaling, clone phishing, vishing, smishing, and search engine phishing. Through in-depth exploration of no case studies, the paper illustrates the substantial financial and non-financial consequences of these attacks. The review also sheds light on the cutting-edge detection and prevention techniques that are currently being deployed to mitigate the risks associated with phishing. Amidst the escalating arms race between cybercriminals and cybersecurity professionals, the paper highlights emergent trends and challenges, stressing the necessity for continued advancements in research and technology. The objective of this paper is to provide a valuable reference for academics, cybersecurity professionals, and policymakers, enabling them to comprehend and address the challenges posed by phishing threats.

n

n

n

Keywords: Phishing Attacks, Cybersecurity, Spear Phishing, Whaling, Clone Phishing, Cyber Threats, Detection Techniques, Cybersecurity Trends, Future Challenges, Case Studies, Impact Analysis, Financial Consequences, Privacy Concerns

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Wireless Security and Networks(ijwsn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Syeda Wajiha Zahra, Muhammad Nadeem, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed Phishing Attack and Its Detections and Prevention Techniques ijwsn September 25, 2023; 01:-

n

How to cite this URL: Syeda Wajiha Zahra, Muhammad Nadeem, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed Phishing Attack and Its Detections and Prevention Techniques ijwsn September 25, 2023 {cited September 25, 2023};01:-. Available from: https://journals.stmjournals.com/ijwsn/article=September 25, 2023/view=0/

nn


nn

Full Text

n[if 992 equals=”Open Access”] [else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(”);n }nelse if (fieldValue == ‘administrator’) { document.write(”); }nelse if (fieldValue == ‘ijwsn’) { document.write(”); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

[1]. Nadeem, M., Arshad, A., Riaz, S., Zahra, S. W., Dutta, A. K., Almotairi, S. (2022). Preventing the Cloud Networks through Semi-Supervised
Clustering from Both Sides Attacks. Applied Sciences, 12(15), 7701.
[2]. Rashid, A.,Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and
Engineering, 7(2), 421-426.
[3]. M. Nadeem, A. Arshad, S. Riaz, S. S. Band and A. Mosavi, Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion
Detection and Prevention System,” in IEEE Access, vol. 9, pp. 152300-152309, 2021
[4]. Jangjou, M., Sohrabi, M. K. (2022). A comprehensive survey on security challenges in different network layers in cloud computing. Archives of
Computational Methods in Engineering, 29(6), 3587-3608.
[5]. Alam, A. (2022). Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloud Computing
Infrastructure. In Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2 (pp. 1-9). Singapore: Springer Nature
Singapore.
[6]. Seifert, M., Kuehnel, S., & Sackmann, S. (2023). Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future
Research Directions. ACM Computing Surveys, 55(11), 1-35.
[7]. Nadeem, F. (2022). Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance
Indicators. IEEE Access, 10, 63245-63257.
[8]. Parast, F. K., Sindhav, C., Nikam, S., Yekta, H. I., Kent, K. B., Hakak, S. (2022). Cloud computing security: A survey of service-based models.
Computers & Security, 114, 102580.
[9]. Nadeem, M., Arshad, A., Riaz, S., Wajiha Zahra, S., S Band, S., Mosavi, A. (2023). Two layer symmetric cryptography algorithm for protecting
data from attacks.
[10]. Mohammed, C. M., & Zeebaree, S. R. (2021). Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International
Journal of Science and Business, 5(2), 17-30.
[11]. Ali, M., Jung, L. T., Sodhro, A. H., Laghari, A. A., Belhaouari, S. B., Gillani, Z. (2023). A Confidentiality-based data Classification-as-a-Service
(C2aaS) for cloud security. Alexandria Engineering Journal, 64, 749-760.
[12]. Butt, U. A., Amin, R., Mehmood, M., Aldabbas, H., Alharbi, M. T.,  Albaqami, N. (2023). Cloud Security Threats and Solutions: A Survey.
Wireless Personal Communications, 128(1), 387-413.
[13]. Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., Tripathi, V., & Dhabliya, D. (2022). Cloud security based attack detection using
transductive learning integrated with Hidden Markov Model. Pattern Recognition Letters, 157, 16-26.
[14]. Nadeem, M., Arshad, A., Riaz, S., Zahra, S. W., Dutta, A. K., Al Moteri, M.,  Almotairi, S. (2022). An Efficient Technique to Prevent Data Misuse
with Matrix Cipher Encryption Algorithms. Comput. Mater. Contin, 74, 4059-4079.
[15]. Upadhyay, D., Zaman, M., Joshi, R., & Sampalli, S. (2021). An efficient key management and multi-layered security framework for SCADA systems.
IEEE Transactions on Network and Service Management, 19(1), 642-660.
[16]. Zahra, S. W., Arshad, A., Nadeem, M., Riaz, S., Dutta, A. K., Alzaid, Z., … & Almotairi, S. (2022). Development of Security Rules and Mechanisms
to Protect Data from Assaults. Applied Sciences, 12(24), 12578.

[17]. M. A. Al-Shabi, “A survey on symmetric and asymmetric cryptography algorithms in information security,” International Journal of Scientific and
Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, 2019.
[18]. A. Musa and A. Mahmood, Client-side cryptography based security for cloud computing system,in 2021 Int. Conf. on Artificial Intelligence and
Smart Systems (ICAIS), Coimbatore, India, pp. 594–600, 2021
[19]. M. E. Hossain, Enhancing the security of caesar cipher algorithm by designing a hybrid cryptography system,International Journal of Computer
Applications, vol. 183, no. 21, pp. 55–57, 2021.
[20]. Akanksha, D.; Samreen, R.; Niharika, G.S.; Shruthi, A.; Kiran, M.J.; Venkatramulu, S. A hybrid cryptosystem based on modified vigenere cipher and
polybius cipher. EPRA Int. J. Res. Dev. 2022, 7, 2455–7838
[21]. H. Sun and R. Grishman, Lexicalized dependency paths based supervised learning for relation extraction, Computer Systems Science and
Engineering, vol. 43, no. 3, pp. 861–870, 2022.
[22]. Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021, August). A hybrid encryption and decryption algorithm using caesar and vigenere
cipher. In Journal of Physics: Conference Series (Vol. 1997, No. 1, p. 012021). IOP Publishing.
[23]. Nadeem, MuhammadArshad, Ali & Riaz, Saman Zahra, Syeda & Dutta, Ashit  Alzaid, Zaid & Alabdan, Rana Almutairi, Badr Alaybani,
Sultan. (2023). Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality. Computers, Materials & Continua. 75. 3065-3089.
10.32604/cmc.2023.035695

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

Regular Issue Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 01
Issue 02
Received September 15, 2023
Accepted September 21, 2023
Published September 25, 2023

n

n

n

[if 1190 not_equal=””]n

Editor

n

[foreach 1188]n

n[/foreach]

n[/if 1190] [if 1177 not_equal=””]n

Reviewer

n

[foreach 1176]n

n[/foreach]

n[/if 1177]

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n n function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]