Phishing is one of the most severe cyber-attacks where researchers are
interested to find a solution. In phishing, attackers lure end-users and steal
their personal in-formation. To minimize the damage caused by phishing must be
detected as early as possible. There are various phishing attacks like spear
phishing, whaling, vishing, smishing, pharming and so on. There are various
phishing detection techniques based on white-list, black-list, content-based,
URL-based, visual-similarity and machine-learning. In this paper, we discuss
various kinds of phishing attacks, attack vectors and detection techniques for
detecting the phishing sites. Performance comparison of 18 different models
along with nine different sources of datasets are given. Challenges in phishing
detection techniques are also given.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

By admin