Cargando…

A comprehensive survey of AI-enabled phishing attacks detection techniques

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by...

Descripción completa

Detalles Bibliográficos
Autores principales: Basit, Abdul, Zafar, Maham, Liu, Xuan, Javed, Abdul Rehman, Jalil, Zunera, Kifayat, Kashif
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7581503/
https://www.ncbi.nlm.nih.gov/pubmed/33110340
http://dx.doi.org/10.1007/s11235-020-00733-2
_version_ 1783598992041443328
author Basit, Abdul
Zafar, Maham
Liu, Xuan
Javed, Abdul Rehman
Jalil, Zunera
Kifayat, Kashif
author_facet Basit, Abdul
Zafar, Maham
Liu, Xuan
Javed, Abdul Rehman
Jalil, Zunera
Kifayat, Kashif
author_sort Basit, Abdul
collection PubMed
description In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
format Online
Article
Text
id pubmed-7581503
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-75815032020-10-23 A comprehensive survey of AI-enabled phishing attacks detection techniques Basit, Abdul Zafar, Maham Liu, Xuan Javed, Abdul Rehman Jalil, Zunera Kifayat, Kashif Telecommun Syst Article In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain. Springer US 2020-10-23 2021 /pmc/articles/PMC7581503/ /pubmed/33110340 http://dx.doi.org/10.1007/s11235-020-00733-2 Text en © Springer Science+Business Media, LLC, part of Springer Nature 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Basit, Abdul
Zafar, Maham
Liu, Xuan
Javed, Abdul Rehman
Jalil, Zunera
Kifayat, Kashif
A comprehensive survey of AI-enabled phishing attacks detection techniques
title A comprehensive survey of AI-enabled phishing attacks detection techniques
title_full A comprehensive survey of AI-enabled phishing attacks detection techniques
title_fullStr A comprehensive survey of AI-enabled phishing attacks detection techniques
title_full_unstemmed A comprehensive survey of AI-enabled phishing attacks detection techniques
title_short A comprehensive survey of AI-enabled phishing attacks detection techniques
title_sort comprehensive survey of ai-enabled phishing attacks detection techniques
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7581503/
https://www.ncbi.nlm.nih.gov/pubmed/33110340
http://dx.doi.org/10.1007/s11235-020-00733-2
work_keys_str_mv AT basitabdul acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT zafarmaham acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT liuxuan acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT javedabdulrehman acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT jalilzunera acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT kifayatkashif acomprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT basitabdul comprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT zafarmaham comprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT liuxuan comprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT javedabdulrehman comprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT jalilzunera comprehensivesurveyofaienabledphishingattacksdetectiontechniques
AT kifayatkashif comprehensivesurveyofaienabledphishingattacksdetectiontechniques