Mitigation strategies against the phishing attacks: A systematic literature review

<p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 article...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Bilal Naqvi (19450327) (author)
مؤلفون آخرون: Kseniia Perova (19450330) (author), Ali Farooq (18692561) (author), Imran Makhdoom (19450333) (author), Shola Oyedeji (19450336) (author), Jari Porras (19450339) (author)
منشور في: 2023
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513507666427904
author Bilal Naqvi (19450327)
author2 Kseniia Perova (19450330)
Ali Farooq (18692561)
Imran Makhdoom (19450333)
Shola Oyedeji (19450336)
Jari Porras (19450339)
author2_role author
author
author
author
author
author_facet Bilal Naqvi (19450327)
Kseniia Perova (19450330)
Ali Farooq (18692561)
Imran Makhdoom (19450333)
Shola Oyedeji (19450336)
Jari Porras (19450339)
author_role author
dc.creator.none.fl_str_mv Bilal Naqvi (19450327)
Kseniia Perova (19450330)
Ali Farooq (18692561)
Imran Makhdoom (19450333)
Shola Oyedeji (19450336)
Jari Porras (19450339)
dc.date.none.fl_str_mv 2023-07-13T09:00:00Z
dc.identifier.none.fl_str_mv 10.1016/j.cose.2023.103387
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Mitigation_strategies_against_the_phishing_attacks_A_systematic_literature_review/26788264
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Software engineering
Guidelines and recommendations
Mitigation strategies
Phishing attacks
Systematic
Literature review
dc.title.none.fl_str_mv Mitigation strategies against the phishing attacks: A systematic literature review
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks.</p><h2>Other Information</h2> <p> Published in: Computers & Security<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cose.2023.103387" target="_blank">https://dx.doi.org/10.1016/j.cose.2023.103387</a></p>
eu_rights_str_mv openAccess
id Manara2_1d451cd459f6503cbd01285e4673aba9
identifier_str_mv 10.1016/j.cose.2023.103387
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/26788264
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Mitigation strategies against the phishing attacks: A systematic literature reviewBilal Naqvi (19450327)Kseniia Perova (19450330)Ali Farooq (18692561)Imran Makhdoom (19450333)Shola Oyedeji (19450336)Jari Porras (19450339)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwareSoftware engineeringGuidelines and recommendationsMitigation strategiesPhishing attacksSystematicLiterature review<p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks.</p><h2>Other Information</h2> <p> Published in: Computers & Security<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cose.2023.103387" target="_blank">https://dx.doi.org/10.1016/j.cose.2023.103387</a></p>2023-07-13T09:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1016/j.cose.2023.103387https://figshare.com/articles/journal_contribution/Mitigation_strategies_against_the_phishing_attacks_A_systematic_literature_review/26788264CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/267882642023-07-13T09:00:00Z
spellingShingle Mitigation strategies against the phishing attacks: A systematic literature review
Bilal Naqvi (19450327)
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Software engineering
Guidelines and recommendations
Mitigation strategies
Phishing attacks
Systematic
Literature review
status_str publishedVersion
title Mitigation strategies against the phishing attacks: A systematic literature review
title_full Mitigation strategies against the phishing attacks: A systematic literature review
title_fullStr Mitigation strategies against the phishing attacks: A systematic literature review
title_full_unstemmed Mitigation strategies against the phishing attacks: A systematic literature review
title_short Mitigation strategies against the phishing attacks: A systematic literature review
title_sort Mitigation strategies against the phishing attacks: A systematic literature review
topic Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Software engineering
Guidelines and recommendations
Mitigation strategies
Phishing attacks
Systematic
Literature review