You are on page 1of 4

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

A Review on Phishing Technique: Classification,


Lifecycle and Detection Approaches
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | 979-8-3503-9926-4/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICACITE57410.2023.10183292

Amandeep Kaur Syed Mohtashim Mian


Assistant Professor Assistant Professor
University Institute of Computing (UIC) University Institute of Computing (UIC)
Chandigarh University, Mohali, India Chandigarh University, Mohali, India
amandeep.e13750@cumail.in syedmohtashim15@gmail.com

Abstract — One of the most cutting-edge and potent hazards the resulting information found online to the highest
on the Internet is phishing. The phrase describes attacks when bidder.
the target is made to assume they are visiting a real website when
they are actually only viewing a replica of one. The most
common way to hack or steal passwords is through phishing.
This is accomplished by showing the bogus login page, also
known as the faked page. This study identifies the various types
of phishing attacks, the various approaches for phishing 1
detection, as well as the problems that arise when these threats
cannot be stopped. Emphasis has also been placed on the
necessity of developing a new type of structured framework for
evaluating the prevention mechanism for this fraudulent Target
Hacker
process.
3
Keywords: Phishing, Tab nabbing, UR, Phish Guard, Phish 4 2
Net, Spoof Guard, net craft, Detection

I. INTRODUCTION
Phishing is one technique used by phishing scammers to
trick unwary consumers into divulging their personal
information. A phishing website is a false website that has a
similar layout but goes to a different location. Criminals are
tricking computer users into disclosing private data, which
include passwords, bank account information, social security
numbers, and more. Users who are not suspicious post their
information believing that these websites are affiliated with Original Website Phishing Website
reputable financial organizations. These phishing websites
Note:
can only be quickly recognized by experts. However, not all
web users are experts in computer engineering; as a result, Attacker sends phishing mail to target.
they fall prey to phishing scams when they divulge their Victim clicks on fishing link & visits fake website.
personal information. [1] Hacker collects important credentials.
Hacker uses victim’s credential to access private
x Phase 1 - A malevolent hacker impersonating a trusted information.
source sends the target an email or message. The target
is frequently prompted to click on a third-party link in Fig. 1. How phishing attack takes place.
order to do a security check or a straightforward
feature upgrade.
II. OBJECTIVE
x Phase 2 - The victim clicks on the malicious link in the The purpose of this paper is to study and analyze various
email, believing it to be from the sender—a bank or problems in phishing attacks. To provide benefit to the user so
business—and is taken to a fake website that is made that a systematic and more strong approach can be used to
to look as real as possible. maintain and prevent users from email scams. This paper
x Phase 3 - The user is prompted to provide certain seeks to conduct a thorough literature study for the
confidential information on the false website, such as examination of various preventative measures. This paper will
login credentials for a particular website. The hacker evaluate these capabilities' trends over the previous two years
who created the website and malicious email receives and go over the countermeasures that are now in use.
all the information when it is entered. Additionally, put your attention on locating and assembling
the preventative measures and developing a framework for
assessing these models.

x Phase 4 - The hacker is free to utilize the account


credentials after obtaining them by logging in or to sell

979-8-3503-9926-4/23/$31.00 ©2023 IEEE 336


Authorized licensed use limited to: AMITY University. Downloaded on September 08,2023 at 08:53:20 UTC from IEEE Xplore. Restrictions apply.
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

background is what differentiates the two. For instance, if we


use the login page for Gmail as an example, the authentic page
will send login requests to the Gmail server, whereas the fake
one will send requests to the PHP server used by the hackers.
The fraudulent pages will appear. Phishing pages will
resemble authentic ones in appearance, but they will have a
different URL in the address box. The victim will never know
what really happened in the background, but his account has
already been compromised thanks to clever phishing pages
that send the stolen data, including passwords, to the hacker
while redirecting the requests to the original website.
Therefore, it is crucial to protect the password. The passwords
have been protected using a variety of methods. One such
approach is to only let the password be used once. As a result,
the server must determine whether the current password is
unique or not. As a result, passwords are rendered meaningless
Fig. 2. Analysis of Phishing Attacks hosted on HTTPS
to hackers even if they are taken. [3] [4]

B. Phishing In Social Networking


III. CLASSIFICATION OF PHISHING Users of social networking sites are readily duped into
The following are a few significant phishing types: providing their usernames and passwords by con artists, which
hackers then use to steal identities or money. When scammers
Deceptive phishing: Deceptive phishing is the practice of have access to a person's personal information, they can log
sending links to a fake website to large numbers of people by in, change their password, start to pose as that person, and
tricking them into clicking the link and being taken to the fake upload and post whatever they want. This causes a great deal
website, where their private information is collected, with of panic, hurts the real user's self-esteem, and paints the real
promises of attractive discounts for prompt responses, account user as the bad guy for the dirty work the hackers do. Even
verification, and apologies for system failure with a request to worse, they send phony emails asking for money or trying to
re-enter/reset the account details. access the accounts of more customers to the contact list of the
person who was hacked. Through these emails, they also
Malware-based phishing: Malware like this is provided as spread malware to further compromise or breach company
an attachment, concealed in a particular file that may be networks, web servers, database systems, etc. Cybercriminals
downloaded from a website, or injected into apps by taking are increasingly focusing their attention on social networking
advantage of a security flaw. sites. [5]
Content Injection Phishing: It is accomplished by Nowadays, phishers are more sophisticated. The latest
changing a section of the website with the content that has generation of phishers uses the same language used by Twitter
affected code inserted into it, tricking people into disclosing to draw in users. Users are instructed to click a link that will
their personal information. take them away from the main website so they may enter their
Man-in-the-middle phishing: The perpetrator of these username, password, the URL of the page they want to view,
assaults, known as phishers, places themselves in between the and a 10-digit verification number. From that point forward,
user and the legitimate website or system. The knowledge or hackers have simple access. The next generation of phishing
credentials gathered will be sold or used while the user isn't will be smarter and more inventive than the current
active on the system. generation, making it more dangerous. If we pay attention to
trends in other online crimes, we will know this. [6]
Search engine phishing: In this search engines are used to
officially index the bogus websites, which will place them By utilizing the client-side proxy and running it in the
among the top search results and increase traffic to the site. user's web browser that requests the data, PoX is a Facebook
More visitors will visit the website to play around as a result extension that allows the user to have fine-grained access
of this. control over their private data without having to put their faith
in additional third parties. [7].
Tab-nabbing: When the user's concentration is on
another tab, a simple-looking page opened in a browser tab
C. E-Mail Phishing
poses as the login page of a well-known web application. [1]
[2] One of the most popular Internet services, email, has
emerged as the primary method for phishing. An email with
A. Role Of Password Attacking In Phishing hyperlinks has developed into a particularly effective weapon
for phishers due to the widespread acceptance of Hypertext
The most common technique for password hacking or Markup Language (HTML) by email clients. Forging is also
theft is phishing. The faked page, often known as the phony permitted by the email-sending protocol which is Simple Mail
login page, is displayed to accomplish this. We may infer that Transfer Protocol (SMTP), which makes it easier for
password theft is a highly successful tactic from the spammers and hackers to do their dirty work. For the specific
information compiled by the anti-phishing working group [2]. issue of phishing detection, anti-spam methods like e-mail
Assuming that the displayed website is a valid one, users will filtering may not be sufficient and successful; computational
enter their login information. Despite having a similar solutions are also required to combat this danger. The black
appearance and feel, the batch program that runs in the list/white list idea is used by many email tools and browser

337
Authorized licensed use limited to: AMITY University. Downloaded on September 08,2023 at 08:53:20 UTC from IEEE Xplore. Restrictions apply.
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

extension tools to restrict the IP address of the SMTP server, V. LIFE CYCLE OF PHISHING ATTACK
a domain, or even the sender's entire email domain. Due to the
possibility of forging the source address, this technique is not
impenetrable. With the volume of emails constantly growing,
it is becoming very difficult to counter phishing by email.

IV. APPROACHES FOR PHISHING DETECTION


Today, phishing is a problem that affects both consumers
and organizations on the internet. In order to get consumers'
personal information, one of the most popular strategies used
by attackers is to build a website that seems identical. Fig. 3. Lifecycle of Phishing attack
Passwords, Social Security numbers, account numbers, and
other confidential information are being gathered, a rogue 1) By mimicking reputable websites, phishers establish
website may resemble an online bank or other financial fraudulent websites.
institution in appearance. It's possible that a victim won't
2) The victim user receives a link to a phishing website
discover the rogue website until after their private data has
been exposed [8] [9] from the scammer.
3) The victim enters their login information on the
Several methods for phishing detection include: phishing website.
4) Phisher obtains the login details from the victim.
Email–Level Approach: This strategy aims to modify
5) By utilizing the victim's login information, the
email-level phishing assaults. The main idea is that victims of
a fake email cannot be duped if they do not open it. Before scammer can visit a real website.
phishing emails are delivered to consumers, they are
frequently detected using filters and content analysis tools. For Phishing attack is now a more serious issue. One's private
instance, a huge amount of phishing emails can be stopped by details, including their bank password and Gmail account, are
utilizing training filters (like Bayesian filters). stolen as a result. To avoid these phishing attacks many
methods have been developed, and each method has its own
Browser-integrated tool approach: These technologies can restrictions. So none of the methods is proven to be efficient
be identified by comparing the URL of the website in the enough to solve all kinds of problems and still phishing attacks
address bar to a blacklist of URLs for dangerous websites, you take place.
may detect phishing attacks. For instance, when a malicious
page loads in Microsoft Internet Explorer (IE) 7, the address
VI. RESULTS
bar turns red. Spoof-Guard and Pwd-Hash are known for,
scholarly, browser-integrated methods to lessen phishing The following points are obvious when looking at the
assaults. Spoof-Guard analyses web pages for obfuscated phishing strategies listed above. In other words, every piece
URLS and other phishing signs. Pwd-Hash, contrasted with, of private information needs to be safer. The use of URL
produces passwords that are unique to a domain and are verification is a crucial method for phishing detection. The
worthless when used with another domain. page can only be examined for any suspicious redirections to
Webpage content analysis It looks at the content, pictures, phishing or other lawful websites after each hyperlink has
forms, input fields, and hyperlinks as well as the HTML code been verified. All forms that may be found on web pages need
on a Web page. Such content-based techniques have in the to be assessed for the types of data that can be collected
past successfully detected phishing pages. However, more through the form fields. 70% of attacks consist of the attacker
lately, phishers have begun to build websites containing non- creating forms containing the input they need to inject
HTML elements including Flash objects, pictures, and Java malicious code to steal users' credentials [11], particularly
applets. A phisher might develop a fake page that is entirely usernames and passwords.
made up of images even though the true page just contains text
content. When it comes to this, content-based anti-phishing
tools are unable to assess the suspicious webpage because it VII. CONCLUSIONS
only has HTML img/> elements in its HTML code. A thorough framework to assess, classify, and handle
these phishing attacks on both the client and server side is
Visual similarity-based approach: According to the brief
work by Liu et al., metrics should be defined by examining urgently needed, and this paper's main goal is to identify and
and contrasting authentic and phishing websites, which may consolidate the protection mechanisms connected with
be utilized to identify phishing pages. The plan is to divide up phishing frauds. The knowledge collected from this study is
the web pages into relevant pieces based on "visual signals." anticipated to result in a set of design guidelines for the
Using the aforementioned measures, the level of similarity system in the form of a structured framework for preventative
between the two websites is then calculated. If the likeness to mechanism evaluation. A system cannot be fully protected by
the real website surpasses a certain threshold, the website is a single model or technique. It is necessary to conduct
considered a phishing page. [10] research inquiries to look into different technical challenges.
This essay tries to highlight the shortcomings of every
preventive mechanism now in use and stresses the necessity
of a new type of structured framework for prevention
mechanism evaluation. In conclusion, it is our hope that this
research will shed some light on the significance of these

338
Authorized licensed use limited to: AMITY University. Downloaded on September 08,2023 at 08:53:20 UTC from IEEE Xplore. Restrictions apply.
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

detection and prevention mechanisms as well as how existing network.In: 2020 international conference on computation, automation
and knowledge management (ICCAKM), Dubai, United Arab
mechanisms might be enhanced in order to develop better Emirates, 2020, pp
preventative strategies. 1417.:https://doi.org/10.1109/ICCAKM46823.2020.9051480.
[7] Egele, Manuel, et al. "PoX: Protecting users from malicious Facebook
applications." Computer Communications 35.12 (2012): 1507-1515.
REFERENCES [8] Mian SM, Kumar R (2019) Review on intend adaptive algorithms for
[1] Suri, Rableen Kaur, Deepak Singh Tomar, and Divya Rishi Sahu. "An time critical applications in underwater weless sensor auditory and
approach to perceive tabnabbing attack."International Journal of multipath networ. In: 2019 international conference on automation,
Scientific and Technology Research 1.6 (2012): 90-94. computational and technology management (ICACTM), London, UK,
[2] Aburrous, Maher, et al. "Experimental case studies for investigating e- pp.469–472
banking phishing techniques and attack strategies." Cognitive (2019). https://doi.org/10.1109/ICACTM.2019.8776782
Computation 2.3 (2010): 242-253. [9] Jakobsson, Markus, and Sid Stamm. "Web camouflage: Protecting
[3] Alsayed, A., and A. Bilgrami. "E-banking security: Internet hacking, your clients from browser-sniffing attacks." IEEE security & Privacy
phishing attacks, analysis and prevention of fraudulent activities." Int. 5.6 (2007): 16-24.
J. Of Emerg. Techn. and Adv. Activ 7.1 (2017): 109-115. [10] Mian, Syed Mohtashim and Kumar, Rajeev, Security Analysis and
[4] Mohtashim Mian, S., Kumar, R. (2023). Deep Learning for Issues in Underwater Wireless Sensor Auditory and Multipath Network
Performance Enhancement Robust Underwater Acoustic (October 31, 2019). The International Journal of Analytical and
Communication Network. In: Maurya, S., Peddoju, S.K., Ahmad, B., Experimental Modal Analysis, Volume XI, Issue X, October/2019,
Chihi, I. (eds) Cyber Technologies and Emerging Sciences. Lecture Available at SSRN: https://ssrn.com/abstract=3896925
Notes in Networks and Systems, vol 467. Springer, Singapore. [11] Etaher, Najla, George RS Weir, and Mamoun Alazab. "From zeus to
https://doi.org/10.1007/978-981-19-2538-2_24 zitmo: Trends in banking malware." 2015 IEEE
[5] Nagunwa, Thomas. "Behind identity theft and fraud in cyberspace: the Trustcom/BigDataSE/ISPA. Vol. 1. IEEE, 2015
current landscape of phishing vectors." International Journal of Cyber-
Security and Digital Forensics (IJCSDF) 3.1 (2014): 72-83.
[6] Mohtashim Mian S, Kumar R (2020) Reduced time application (RTA)
in distributed underwater wireless sensor in multipath routing

339
Authorized licensed use limited to: AMITY University. Downloaded on September 08,2023 at 08:53:20 UTC from IEEE Xplore. Restrictions apply.

You might also like