[go: up one dir, main page]

Skip to main content

Social Phishing

  • Reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining
  • 110 Accesses

Synonyms

Email; Fraud; Information; Internet; Social network; Suspicious

Glossary

Anti-phishing:

Efforts taken from multiple perspectives to combat phishing crimes

Email spam:

Unsolicited emails for the purpose of advertisement or committing fraud

Machine learning:

The design and development of algorithms that takes as input empirical data, and outputs patterns and predictions for future data

Phisher:

Fraudsters who commit phishing crimes

Phishing:

Electronic fraud based on social engineering

Phishing site:

Web sites created by phishers to steal sensitive information from users

Definition

Nowadays, phishing has gradually become a popular type of electronic fraud that makes use of social engineering to steal sensitive information from users such as user name, password, bank account number, credit card details, etc. (https://kb.iu.edu/d/arsf, http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_AOL). Phishing can be carried out via emails, instant messages, phone calls, text...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abu-nimeh S, Nappa D, Wang X, Nair S (2008) A distributed architecture for phishing detection using Bayesian additive regression trees. In: eCrime Researchers Summit. Atalanta, Georgia

    Google Scholar 

  • Chandrasekaran M, Narayanan K, Upadhyaya S (2006) Phishing email detection based on structural properties. In: Proceedings of the NYS cyber security conference. Albany, NY

    Google Scholar 

  • eBay (2007) eBay tool bar. http://anywhere.ebay.com/browser/firefox/

  • Egelman S, Cranor LF, Hong J (2008) You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, CHI, Florence

    Google Scholar 

  • Field J (2017) MailScanner. http://www.mailscanner.info

  • Herley C, Florencio D (2008) A profitless endeavor: phishing as tragedy of the commons. In NSPW’08: Proceedings of the 2008 workshop on new security paradigms

    Google Scholar 

  • ClamAV (2016) http://www.clamav.net

  • Jagatic T, Johnson N, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100

    Article  Google Scholar 

  • Jonathan BP (1982) Simple mail transfer protocol. RFC821. https://tools.ietf.org/html/rfc821

  • Kirda E, Kruegel C (2006) Protecting users against phishing attacks. Comput J. https://doi.org/10.1093/comjnl/bxh169

  • Ludl C, McAllister S, Kirda E, Kruegel C (2007) On the effectiveness of techniques to detect phishing sites. In: DIMVA ’07: Proceedings of the 4th international conference on detection of intrusions and Malware, and vulnerability assessment. Springer, Berlin/Heidelberg, pp 20–39

    Google Scholar 

  • NetCraft (2007) Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/

  • Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: SIGCOMM ’06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. ACM, New York, pp 291–302

    Google Scholar 

  • Schneider F, Provos N, Moll R, Chew M, Rakowski B (2007) Phishing protection design documentation. https://wiki.mozilla.org/Phishing_Protection:_Design_ Documentation

    Google Scholar 

  • Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009: sixth conference on email and anti-spam, July 2009

    Google Scholar 

  • Sun B, Wen Q, Liang X (2010) A DNS based anti-phishing approach. In: Second international conference on networks security. Wireless Communications and Trusted Computing, Beijing

    Google Scholar 

  • Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages. In: NDSS’10. San Diego, California

    Google Scholar 

  • Wilson C, Argles D (2011) The fight against phishing: technology, the end user and legislation. In: The international conference on information society (i-Society), London

    Google Scholar 

  • Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal

    Google Scholar 

  • Zhang J, Wu C Guan H, Wang Q, Zhang L, Ou Y, Xin Y, Chen L (2011) An content-analysis based large scale anti-phishing gateway. In: 12th IEEE international conference on communication technology, Nanjing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yada Zhu .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Zhu, Y., He, J. (2018). Social Phishing. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_290

Download citation

Publish with us

Policies and ethics