Synonyms
Glossary
- Anti-phishing:
-
Efforts taken from multiple perspectives to combat phishing crimes
- Email spam:
-
Unsolicited emails for the purpose of advertisement or committing fraud
- Machine learning:
-
The design and development of algorithms that takes as input empirical data, and outputs patterns and predictions for future data
- Phisher:
-
Fraudsters who commit phishing crimes
- Phishing:
-
Electronic fraud based on social engineering
- Phishing site:
-
Web sites created by phishers to steal sensitive information from users
Definition
Nowadays, phishing has gradually become a popular type of electronic fraud that makes use of social engineering to steal sensitive information from users such as user name, password, bank account number, credit card details, etc. (https://kb.iu.edu/d/arsf, http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_AOL). Phishing can be carried out via emails, instant messages, phone calls, text...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abu-nimeh S, Nappa D, Wang X, Nair S (2008) A distributed architecture for phishing detection using Bayesian additive regression trees. In: eCrime Researchers Summit. Atalanta, Georgia
Chandrasekaran M, Narayanan K, Upadhyaya S (2006) Phishing email detection based on structural properties. In: Proceedings of the NYS cyber security conference. Albany, NY
eBay (2007) eBay tool bar. http://anywhere.ebay.com/browser/firefox/
Egelman S, Cranor LF, Hong J (2008) You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, CHI, Florence
Field J (2017) MailScanner. http://www.mailscanner.info
Herley C, Florencio D (2008) A profitless endeavor: phishing as tragedy of the commons. In NSPW’08: Proceedings of the 2008 workshop on new security paradigms
ClamAV (2016) http://www.clamav.net
Jagatic T, Johnson N, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Jonathan BP (1982) Simple mail transfer protocol. RFC821. https://tools.ietf.org/html/rfc821
Kirda E, Kruegel C (2006) Protecting users against phishing attacks. Comput J. https://doi.org/10.1093/comjnl/bxh169
Ludl C, McAllister S, Kirda E, Kruegel C (2007) On the effectiveness of techniques to detect phishing sites. In: DIMVA ’07: Proceedings of the 4th international conference on detection of intrusions and Malware, and vulnerability assessment. Springer, Berlin/Heidelberg, pp 20–39
NetCraft (2007) Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/
Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: SIGCOMM ’06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. ACM, New York, pp 291–302
Schneider F, Provos N, Moll R, Chew M, Rakowski B (2007) Phishing protection design documentation. https://wiki.mozilla.org/Phishing_Protection:_Design_ Documentation
Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009: sixth conference on email and anti-spam, July 2009
Sun B, Wen Q, Liang X (2010) A DNS based anti-phishing approach. In: Second international conference on networks security. Wireless Communications and Trusted Computing, Beijing
Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages. In: NDSS’10. San Diego, California
Wilson C, Argles D (2011) The fight against phishing: technology, the end user and legislation. In: The international conference on information society (i-Society), London
Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal
Zhang J, Wu C Guan H, Wang Q, Zhang L, Ou Y, Xin Y, Chen L (2011) An content-analysis based large scale anti-phishing gateway. In: 12th IEEE international conference on communication technology, Nanjing
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Zhu, Y., He, J. (2018). Social Phishing. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_290
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_290
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering