[go: up one dir, main page]

Skip to main content

Social Engineering/Phishing

  • Reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining

Synonyms

E-mail; Fraud; Information; Internet; Social network; Suspicious

Glossary

E-mail Spam:

Unsolicited e-mails for the purpose of advertisement or committing fraud

Phishing:

Electronic fraud based on social engineering

Phisher:

Fraudsters who commit phishing crimes

Phishing Site:

Websites created by phishers to steal sensitive information from users

Anti-phishing:

Efforts taken from multiple perspectives to combat phishing crimes

Machine Learning:

The design and development of algorithms that takes as input empirical data and outputs patterns and predictions for future data

Definition

Nowadays, phishing has gradually become a popular type of electronic fraud that makes use of social engineering to steal sensitive information from users such as user name, password, bank account number, and credit card details (http://www.indiana.edu/~phishing/?about; http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_AOL). Phishing can be carried out via e-mails, instant messages, phone...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abu-nimeh S, Nappa D, Wang X, Nair S (2008) A distributed architecture for phishing detection using Bayesian Additive Regression Trees. eCrime Researchers Summit, Atlanta, GA

    Google Scholar 

  • Chandrasekaran M, Narayanan K, Upadhyaya S (2006) Phishing email detection based on structural properties. In: Proceedings of the NYS cyber security conference. Albany, NY

    Google Scholar 

  • ClamAV. ClamAV. http://www.clamav.net. Accessed 23 July 2012

  • eBay (2007) eBay tool bar. http://anywhere.ebay.com/browser/firefox/. Accessed 11 Feb 2013

  • Egelman S, Cranor LF, Hong J (2008) You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI, Florence

    Google Scholar 

  • Herley C, Florêncio D (2008) A profitless Endeavor: phishing as Tragedy of the commons. In: NSPW. Victoria, BC

    Google Scholar 

  • http://cups.cs.cmu.edu. Accessed 18 July 2012

  • http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_ AOL. Accessed 18 July 2012

  • http://ists.dartmouth.edu/. Accessed 11 Feb 2013

  • http://theory.stanford.edu/seclab/. Accessed 18 July 2012

  • http://www.cerias.purdue.edu. Accessed 18 July 2012

  • http://www.csionsite.com/2012/phishing/. Accessed 23 July 2012

  • http://www.indiana.edu/~phishing/. Accessed 18 July 2012

  • http://www.indiana.edu/~phishing/?about. Accessed 18 July 2012

  • http://www.phishing.org. Accessed 23 July 2012

  • https://www.paypal.com/home. Accessed 23 July 2012

  • Jagatic T, Johnson N, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–97

    Google Scholar 

  • Jonathan BP (1982) Simple Mail Transfer Protocol. RFC821: http://freesoft.org/CIE/RFC/821/index.htm. Accessed 11 Feb 2013

  • Julian Field (2007) MailScanner. http://www.mailscanner. info. Accessed 23 July 2012

  • Kirda E, Kruegel C (2005) Protecting users against phishing attacks. Comput J, 49:2006

    Google Scholar 

  • Ludl C, McAllister S, Kirda E, Kruegel C (2007) On the effectiveness of techniques to detect phishing sites. In: DIMVA '07: proceedings of the 4th international conference on detection of intrusions and malware, and vulnerability assessment. Springer, Berlin/Heidelberg, Lucerne, Switzerland, p 2039

    Google Scholar 

  • NetCraft (2007) Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/. Accessed 23 July 2012

  • Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: SIGCOMM '06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. Pisa, Italy, pp 291–302

    Google Scholar 

  • Schneider F, Provos N, Moll R, Chew M, Rakowski B (2007) Phishing protection design documentation. https://wiki.mozilla.org/Phishing_Protection:_Design_Documentation. Accessed 23 July 2012

  • Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009: sixth conference on email and anti-spam. Como, Italy

    Google Scholar 

  • Sun B, Wen Q, Liang X (2010) A DNS based anti-phishing approach. In: In second international conference on networks security, wireless communications and trusted computing, Beijing

    Google Scholar 

  • Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages. In: NDSS'10. San Diego, California

    Google Scholar 

  • Wilson C, Argles D (2011) The Fight against phishing: technology, the end user and legislation. In: The international conference on information society (i-Society), London

    Google Scholar 

  • Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal

    Google Scholar 

  • Zhang J, Wu C, Guan H, Wang Q, Zhang L, Ou Y, Xin Y, Chen L (2011) An content-analysis based large scale anti-phishing gateway. In: 12th IEEE international conference on communication technology, Nanjing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Cite this entry

He, J., Zhu, Y. (2014). Social Engineering/Phishing. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6170-8_290

Download citation

Publish with us

Policies and ethics