Mitigation strategies against the phishing attacks: A systematic literature review
<p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 article...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , , , |
| منشور في: |
2023
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513507666427904 |
|---|---|
| author | Bilal Naqvi (19450327) |
| author2 | Kseniia Perova (19450330) Ali Farooq (18692561) Imran Makhdoom (19450333) Shola Oyedeji (19450336) Jari Porras (19450339) |
| author2_role | author author author author author |
| author_facet | Bilal Naqvi (19450327) Kseniia Perova (19450330) Ali Farooq (18692561) Imran Makhdoom (19450333) Shola Oyedeji (19450336) Jari Porras (19450339) |
| author_role | author |
| dc.creator.none.fl_str_mv | Bilal Naqvi (19450327) Kseniia Perova (19450330) Ali Farooq (18692561) Imran Makhdoom (19450333) Shola Oyedeji (19450336) Jari Porras (19450339) |
| dc.date.none.fl_str_mv | 2023-07-13T09:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1016/j.cose.2023.103387 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Mitigation_strategies_against_the_phishing_attacks_A_systematic_literature_review/26788264 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Software engineering Guidelines and recommendations Mitigation strategies Phishing attacks Systematic Literature review |
| dc.title.none.fl_str_mv | Mitigation strategies against the phishing attacks: A systematic literature review |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks.</p><h2>Other Information</h2> <p> Published in: Computers & Security<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cose.2023.103387" target="_blank">https://dx.doi.org/10.1016/j.cose.2023.103387</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_1d451cd459f6503cbd01285e4673aba9 |
| identifier_str_mv | 10.1016/j.cose.2023.103387 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/26788264 |
| publishDate | 2023 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Mitigation strategies against the phishing attacks: A systematic literature reviewBilal Naqvi (19450327)Kseniia Perova (19450330)Ali Farooq (18692561)Imran Makhdoom (19450333)Shola Oyedeji (19450336)Jari Porras (19450339)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwareSoftware engineeringGuidelines and recommendationsMitigation strategiesPhishing attacksSystematicLiterature review<p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks.</p><h2>Other Information</h2> <p> Published in: Computers & Security<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cose.2023.103387" target="_blank">https://dx.doi.org/10.1016/j.cose.2023.103387</a></p>2023-07-13T09:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1016/j.cose.2023.103387https://figshare.com/articles/journal_contribution/Mitigation_strategies_against_the_phishing_attacks_A_systematic_literature_review/26788264CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/267882642023-07-13T09:00:00Z |
| spellingShingle | Mitigation strategies against the phishing attacks: A systematic literature review Bilal Naqvi (19450327) Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Software engineering Guidelines and recommendations Mitigation strategies Phishing attacks Systematic Literature review |
| status_str | publishedVersion |
| title | Mitigation strategies against the phishing attacks: A systematic literature review |
| title_full | Mitigation strategies against the phishing attacks: A systematic literature review |
| title_fullStr | Mitigation strategies against the phishing attacks: A systematic literature review |
| title_full_unstemmed | Mitigation strategies against the phishing attacks: A systematic literature review |
| title_short | Mitigation strategies against the phishing attacks: A systematic literature review |
| title_sort | Mitigation strategies against the phishing attacks: A systematic literature review |
| topic | Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Software engineering Guidelines and recommendations Mitigation strategies Phishing attacks Systematic Literature review |