A Survey of Phishing Email Filtering Techniques

被引:115
作者
Almomani, Ammar
Gupta, B. B. [1 ]
Atawneh, Samer [2 ]
Meulenberg, A. [2 ]
Almomani, Eman [2 ]
机构
[1] Univ Pune, RSCOE, Pune, Maharashtra, India
[2] Univ Sains Malaysia, George Town, Malaysia
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2013年 / 15卷 / 04期
关键词
Phishing email; Filtering; Classifiers; Machine learning; Authentication; Network level protection; CLASSIFICATION; MACHINE;
D O I
10.1109/SURV.2013.030713.00020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing email is one of the major problems of today's Internet, resulting in financial losses for organizations and annoying individual users. Numerous approaches have been developed to filter phishing emails, yet the problem still lacks a complete solution. In this paper, we present a survey of the state of the art research on such attacks. This is the first comprehensive survey to discuss methods of protection against phishing email attacks in detail. We present an overview of the various techniques presently used to detect phishing email, at the different stages of attack, mostly focusing on machine-learning techniques. A comparative study and evaluation of these filtering methods is carried out. This provides an understanding of the problem, its current solution space, and the future research directions anticipated.
引用
收藏
页码:2070 / 2090
页数:21
相关论文
共 106 条
  • [1] A.P. W. Group, 2011, APWG PHISH TRENDS RE
  • [2] A.P. W. Group, 2004, EBAY NOTICE EBAY OBL
  • [3] Abu-Nimeh S., 2008, IEEE GLOBAL TELECOMM, V1, P1, DOI DOI 10.1109/GLOCOM.2008.ECP.386
  • [4] Abu-Nimeh S., 2007, P ANT WORK GROUPS 2, P60, DOI DOI 10.1145/1299015.1299021
  • [5] Abu-Nimeh S., 2009, IEEE INT C COMMUNICA, V1, P1
  • [6] Aburrous Maher, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P176, DOI 10.1109/ITNG.2010.117
  • [7] Aburrous M, 2008, 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, P637
  • [8] Adida B., 2005, FIGHITNG PHISHING AT
  • [9] Almomani Ammar, 2012, Journal of Computer Science, V8, P1099, DOI 10.3844/jcssp.2012.1099.1107
  • [10] ALmomani A., 2013, INDIAN J SCI TECHNOL, V6