Abstract
Social phishers continuously adapt the novel trapping techniques of prying usernames and passwords by establishing a friendly relationship through microblog messages using various social networking environments (SNEs) for financial benefits. APWG report of 2018 shows the successive rise in phishing attacks via URLS, fake Web sites, spoofed e-mail links, domain name usage, and social media content (APWG, Anti-Phishing Working Group report [1]). Innumerable defending techniques had been proposed earlier, but are still vulnerable due to exchange of compromised microblogs in SNEs resulting in leaking of confidential information and falling prey to phishers attack. To mitigate the latent fraudulent phishing mechanisms, there is a scope and an immense need to get rid of phishing attacks in SNEs. This paper surveys and analyzes the various social phishing detection and prevention mechanisms that are developed for SNEs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
APWG. 2018. Anti-Phishing Working Group Report. http://docs.apwg.org/reports/apwg_trends_report_q1_2018.pdf. Accessed 17 Sept 2018.
Jagatic, T. 2005. Social Phishing. In School of Informatics. Bloomington: Indiana University.
Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin, and Hsin-Ya Chen. 2018. MapTalk: Mosaicking Physical Objects into the Cyber World. In Cyber-Physical Systems. TandFonline.
Kayes, Imrul, and Adriana Iamnitchi. 2017. Privacy and Security in Online Social Networks: A Survey. In Proceeding of Online Social Networks and Media, vol. 3–4, 1–21. Elsevier.
Shaikh, Anjum N., Antesar M. Shabut, and M.A. Hossain. 2016. A Literature Review on Phishing Crime, Prevention Review and Investigation of Gaps. In: 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA). IEEE.
Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009. Prying Data Out of a Social Network. In Proceedings of Advances in Social Networks Analysis and Mining.
Hai Wang, Alex. 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. In Proceedings of ACM.
Ratkiewicz, J., M.D. Conover, M. Meiss, B. Gonçalves, and A. Fla. 2011. Detecting and Tracking Political Abuse in Social Media. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. Association for the Advancement of Artificial.
Beck, K. 2011. Analyzing Tweets to Identify Malicious Messages. In IEEE International Conference on Electro/Information Technology (EIT), 1–5. IEEE.
Park, Byung Joon, and Jin Seop Han. 2016. Efficient Decision Support for Detecting Content Polluters on Social Networks: An Approach Based on Automatic Knowledge Acquisition From Behavioral Patterns. Information Technology and Management 17 (1): 95–105.
Gupta, Surbhi , Abhishek Singha, and Akanksha Kapoor. 2016. A Literature Survey on Social Engineering Attacks: Phishing Attack. In: International Conference on Computing, Communication and Automation (ICCCA). IEEE.
Thelwall, M. 2017. TensiStrength: Stress and Relaxation Magnitude Detection for Social Media Texts. Journal of Information Processing & Management, 53 (1): 106–121. Elsevier.
Mahmood Ali, Mohd, and Lakshmi Rajamani. 2012. APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach. In Global Trends in Computing and Communication Systems, CCIS, vol. 269, 490–502. Springer.
Mahmood Ali, Mohd, and Lakshmi Rajamani. 2012. Deceptive Phishing Detection System: From Audio and Text Messages in Instant Messengers Using Data Mining Approach. In Proceedings of the IEEE International Conference on Pattern Recognition, Informatics and Medical Engineering, 458–463. IEEE.
Qaseem, Mohd S., Nayeemuddin, M., et. al. 2014. APDs: Framework for Surveillance of Phishing words in Instant Messaging Systems Using Data Mining and Ontology. In: Symposium of TechSym, Article No. 486. IEEE.
Mahmood Ali, Mohd et al. 2015. An Approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and Wordnet Ontology. In: International Conference on Electrical, Electronics, Signals Communication and Optimization (EESCO). IEEE.
Mahmood Ali, Mohd, and Lakshmi Rajamani. 2011. APD: ARM Phishing Detector A System for Detecting Phishing in Instant Messengers. International Journal of Information Processing, 5 (2): 22–30. IK Publishers, India.
Qaseem, Mohammad S., and A. Govardhan. Phishing Detection in IMs using Domain Ontology and CBA—An innovative Rule Generation Approach. International Journal of Information Sciences and Techniques (IJIST) 4 (4/5/6). India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ali, M.M., Qaseem, M.S., Rahman, M.A.U. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_37
Download citation
DOI: https://doi.org/10.1007/978-981-15-1480-7_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1479-1
Online ISBN: 978-981-15-1480-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)