Andrushchak I.Ye. Features of the main directions, techniques and methods of protection against fishing at-tacks

Keywords: fishing, favicon, cyber threat, vishing, smishing, mobile application, anti-phishing protection, site falsification.

Abstract

This article discusses common modern heuristic technologies used in anti-phishing tools and protection methods. An overview of different types of mobile phishing attacks is given, as well as the main methods of detecting and reducing the level of fishing attacks.

References

Bay H., Ess A., and Tuytelaars T. SURF: Speeded Up Robust Features // Computer Vision and Image Understanding (CVIU). 2008. V. 110. No. 3. P. 346–359.

Devyanin P. N. Security models of computer systems. Access and information flow management. Proc. allowance for universities. M.: Hotline-Telecom, 2011.

Lininger R. and Vines D. Phishing: Cutting the Identity Theft Line. Wiley, 2005. 334 p.

Mobile Phishing Attacks and Mitigation Techniques. [Electronic resource] // Journal of Information Security. URL: http://www.scirp.org/journal/jis/

Patil R., Dhamdhere B.D., Dhonde K.S., Chinchwade R.G., Mehetre S.B. A hybrid model to detect phishing sites using clustering and bayesian approach // IEEE International Conference for Convergence of Technology (I2CT), 2014.

Sandhu R., Coyne E. J., Feinstein H. L., and Youman C. E. Role-Based Access Control Models // IEEE Computer (IEEE Press). 1996. V. 29. No. 2. P. 38-47.


Abstract views: 0
PDF Downloads: 0
Published
2022-06-30
How to Cite
Andrushchak , I. (2022). Andrushchak I.Ye. Features of the main directions, techniques and methods of protection against fishing at-tacks. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (47), 5-9. https://doi.org/10.36910/6775-2524-0560-2022-47-01