A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

Authors

  • Riyadh Rahef Nuiaa Al Ogaili
  • Selvakumar Manickam

DOI:

https://doi.org/10.31185/wjps.143

Abstract

People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities. In recent years, phishing assaults have become one of the most common threats faced by internet users, governments, and service providers. The attacker(s) uses falsified emails or bogus websites to obtain the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) in a phishing assault. Studies have classed phishing attacks based on fundamental phishing mechanisms and defenses, ignoring the importance of the phishing lifecycle from beginning to conclusion. This study also provides a new thorough taxonomy of phishing assaults, including attack phases, attacker types, vulnerabilities, threats, targets, attack media, and attacking strategies. Furthermore, the proposed anatomy will help readers comprehend the full lifecycle of a phishing attack, which will raise awareness of these phishing attacks and the strategies utilized; it will also aid in the development of a comprehensive anti-phishing system. In addition, various preventative precautions are being investigated

 

Author Biography

  • Selvakumar Manickam

     

     

     

References

Downloads

Published

2023-06-29

Issue

Section

Computer

How to Cite

Al Ogaili, R. R. N., & Manickam, S. (2023). A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies. Wasit Journal for Pure Sciences, 2(2), 251-269. https://doi.org/10.31185/wjps.143