Synonyms
Glossary
- E-mail Spam:
-
Unsolicited e-mails for the purpose of advertisement or committing fraud
- Phishing:
-
Electronic fraud based on social engineering
- Phisher:
-
Fraudsters who commit phishing crimes
- Phishing Site:
-
Websites created by phishers to steal sensitive information from users
- Anti-phishing:
-
Efforts taken from multiple perspectives to combat phishing crimes
- Machine Learning:
-
The design and development of algorithms that takes as input empirical data and outputs patterns and predictions for future data
Definition
Nowadays, phishing has gradually become a popular type of electronic fraud that makes use of social engineering to steal sensitive information from users such as user name, password, bank account number, and credit card details (http://www.indiana.edu/~phishing/?about; http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_AOL). Phishing can be carried out via e-mails, instant messages, phone...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abu-nimeh S, Nappa D, Wang X, Nair S (2008) A distributed architecture for phishing detection using Bayesian Additive Regression Trees. eCrime Researchers Summit, Atlanta, GA
Chandrasekaran M, Narayanan K, Upadhyaya S (2006) Phishing email detection based on structural properties. In: Proceedings of the NYS cyber security conference. Albany, NY
ClamAV. ClamAV. http://www.clamav.net. Accessed 23 July 2012
eBay (2007) eBay tool bar. http://anywhere.ebay.com/browser/firefox/. Accessed 11 Feb 2013
Egelman S, Cranor LF, Hong J (2008) You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI, Florence
Herley C, Florêncio D (2008) A profitless Endeavor: phishing as Tragedy of the commons. In: NSPW. Victoria, BC
http://cups.cs.cmu.edu. Accessed 18 July 2012
http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_ AOL. Accessed 18 July 2012
http://ists.dartmouth.edu/. Accessed 11 Feb 2013
http://theory.stanford.edu/seclab/. Accessed 18 July 2012
http://www.cerias.purdue.edu. Accessed 18 July 2012
http://www.csionsite.com/2012/phishing/. Accessed 23 July 2012
http://www.indiana.edu/~phishing/. Accessed 18 July 2012
http://www.indiana.edu/~phishing/?about. Accessed 18 July 2012
http://www.phishing.org. Accessed 23 July 2012
https://www.paypal.com/home. Accessed 23 July 2012
Jagatic T, Johnson N, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–97
Jonathan BP (1982) Simple Mail Transfer Protocol. RFC821: http://freesoft.org/CIE/RFC/821/index.htm. Accessed 11 Feb 2013
Julian Field (2007) MailScanner. http://www.mailscanner. info. Accessed 23 July 2012
Kirda E, Kruegel C (2005) Protecting users against phishing attacks. Comput J, 49:2006
Ludl C, McAllister S, Kirda E, Kruegel C (2007) On the effectiveness of techniques to detect phishing sites. In: DIMVA '07: proceedings of the 4th international conference on detection of intrusions and malware, and vulnerability assessment. Springer, Berlin/Heidelberg, Lucerne, Switzerland, p 2039
NetCraft (2007) Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/. Accessed 23 July 2012
Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: SIGCOMM '06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. Pisa, Italy, pp 291–302
Schneider F, Provos N, Moll R, Chew M, Rakowski B (2007) Phishing protection design documentation. https://wiki.mozilla.org/Phishing_Protection:_Design_Documentation. Accessed 23 July 2012
Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009: sixth conference on email and anti-spam. Como, Italy
Sun B, Wen Q, Liang X (2010) A DNS based anti-phishing approach. In: In second international conference on networks security, wireless communications and trusted computing, Beijing
Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages. In: NDSS'10. San Diego, California
Wilson C, Argles D (2011) The Fight against phishing: technology, the end user and legislation. In: The international conference on information society (i-Society), London
Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal
Zhang J, Wu C, Guan H, Wang Q, Zhang L, Ou Y, Xin Y, Chen L (2011) An content-analysis based large scale anti-phishing gateway. In: 12th IEEE international conference on communication technology, Nanjing
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this entry
Cite this entry
He, J., Zhu, Y. (2014). Social Engineering/Phishing. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6170-8_290
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6170-8_290
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6169-2
Online ISBN: 978-1-4614-6170-8
eBook Packages: Computer ScienceReference Module Computer Science and Engineering