Skip to main content

A Survey on Deceptive Phishing Attacks in Social Networking Environments

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Computational Intelligence and Informatics

Abstract

Social phishers continuously adapt the novel trapping techniques of prying usernames and passwords by establishing a friendly relationship through microblog messages using various social networking environments (SNEs) for financial benefits. APWG report of 2018 shows the successive rise in phishing attacks via URLS, fake Web sites, spoofed e-mail links, domain name usage, and social media content (APWG, Anti-Phishing Working Group report [1]). Innumerable defending techniques had been proposed earlier, but are still vulnerable due to exchange of compromised microblogs in SNEs resulting in leaking of confidential information and falling prey to phishers attack. To mitigate the latent fraudulent phishing mechanisms, there is a scope and an immense need to get rid of phishing attacks in SNEs. This paper surveys and analyzes the various social phishing detection and prevention mechanisms that are developed for SNEs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. APWG. 2018. Anti-Phishing Working Group Report. http://docs.apwg.org/reports/apwg_trends_report_q1_2018.pdf. Accessed 17 Sept 2018.

  2. Jagatic, T. 2005. Social Phishing. In School of Informatics. Bloomington: Indiana University.

    Google Scholar 

  3. Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin, and Hsin-Ya Chen. 2018. MapTalk: Mosaicking Physical Objects into the Cyber World. In Cyber-Physical Systems. TandFonline.

    Google Scholar 

  4. Kayes, Imrul, and Adriana Iamnitchi. 2017. Privacy and Security in Online Social Networks: A Survey. In Proceeding of Online Social Networks and Media, vol. 3–4, 1–21. Elsevier.

    Google Scholar 

  5. Shaikh, Anjum N., Antesar M. Shabut, and M.A. Hossain. 2016. A Literature Review on Phishing Crime, Prevention Review and Investigation of Gaps. In: 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA). IEEE.

    Google Scholar 

  6. Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009. Prying Data Out of a Social Network. In Proceedings of Advances in Social Networks Analysis and Mining.

    Google Scholar 

  7. Hai Wang, Alex. 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. In Proceedings of ACM.

    Google Scholar 

  8. Ratkiewicz, J., M.D. Conover, M. Meiss, B. Gonçalves, and A. Fla. 2011. Detecting and Tracking Political Abuse in Social Media. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. Association for the Advancement of Artificial.

    Google Scholar 

  9. Beck, K. 2011. Analyzing Tweets to Identify Malicious Messages. In IEEE International Conference on Electro/Information Technology (EIT), 1–5. IEEE.

    Google Scholar 

  10. Park, Byung Joon, and Jin Seop Han. 2016. Efficient Decision Support for Detecting Content Polluters on Social Networks: An Approach Based on Automatic Knowledge Acquisition From Behavioral Patterns. Information Technology and Management 17 (1): 95–105.

    Article  Google Scholar 

  11. Gupta, Surbhi , Abhishek Singha, and Akanksha Kapoor. 2016. A Literature Survey on Social Engineering Attacks: Phishing Attack. In: International Conference on Computing, Communication and Automation (ICCCA). IEEE.

    Google Scholar 

  12. Thelwall, M. 2017. TensiStrength: Stress and Relaxation Magnitude Detection for Social Media Texts. Journal of Information Processing & Management, 53 (1): 106–121. Elsevier.

    Google Scholar 

  13. Mahmood Ali, Mohd, and Lakshmi Rajamani. 2012. APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach. In Global Trends in Computing and Communication Systems, CCIS, vol. 269, 490–502. Springer.

    Google Scholar 

  14. Mahmood Ali, Mohd, and Lakshmi Rajamani. 2012. Deceptive Phishing Detection System: From Audio and Text Messages in Instant Messengers Using Data Mining Approach. In Proceedings of the IEEE International Conference on Pattern Recognition, Informatics and Medical Engineering, 458–463. IEEE.

    Google Scholar 

  15. Qaseem, Mohd S., Nayeemuddin, M., et. al. 2014. APDs: Framework for Surveillance of Phishing words in Instant Messaging Systems Using Data Mining and Ontology. In: Symposium of TechSym, Article No. 486. IEEE.

    Google Scholar 

  16. Mahmood Ali, Mohd et al. 2015. An Approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and Wordnet Ontology. In: International Conference on Electrical, Electronics, Signals Communication and Optimization (EESCO). IEEE.

    Google Scholar 

  17. https://www.antiphishing.org/resources/apwg-reports/.

  18. Mahmood Ali, Mohd, and Lakshmi Rajamani. 2011. APD: ARM Phishing Detector A System for Detecting Phishing in Instant Messengers. International Journal of Information Processing, 5 (2): 22–30. IK Publishers, India.

    Google Scholar 

  19. Qaseem, Mohammad S., and A. Govardhan. Phishing Detection in IMs using Domain Ontology and CBA—An innovative Rule Generation Approach. International Journal of Information Sciences and Techniques (IJIST) 4 (4/5/6). India.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Mahmood Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ali, M.M., Qaseem, M.S., Rahman, M.A.U. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_37

Download citation

Publish with us

Policies and ethics