A Literature Survey On Social Engineering Attacks: Phishing Attack
A Literature Survey On Social Engineering Attacks: Phishing Attack
A Literature Survey On Social Engineering Attacks: Phishing Attack
Abstract— Phishing is a network type attack where the it is sent by banks to disclose the information for financial
attacker creates the fake of an existing webpage to fool an gain. For Example, the attacker sends you an email such as
online user into elicit personal Information. The prime “you have won a prize”, in this mail they define some
objective of this review is to do literature survey on social causes such as you have won the Rs.10000000 and your
engineering attack: Phishing attack and techniques to detect
attack. Phishing is the combination of social engineering and
mobile number is selected randomly by the computer so fill
technical methods to convince the user to reveal their personal the given information. Fake details such as, we will transfer
data. The paper discusses about the Phishing social the money directly in your account are given. They ask the
engineering attack theoretically and their issues in the life of account number, credit card number and the password etc.
human Beings.Phishing is typically carried out by Email in order to capture our details. It uses social engineering
spoofing or instant messaging. It targets the user who has no techniques with brilliantly arranged tricks to bait users for
knowledge about social engineering attacks, and internet elicit data. The bait can be delivered message, phone, and
security, like persons who do not take care of privacy of their spoofed emails. Phishersend spoofed emails to millions of
accounts details such as Facebook, Gmail, credit banks internet users in hope that at least a few of them might bite
accounts and other financial accounts. The paper discusses
various types of Phishing attacks such as Tab-napping,
it. It targets the people who don‟t have Knowledge about
spoofing emails, Trojan horse, hacking and how to prevent online attack, Internet security and make them believe that
them. At the same time this paper also provides different the emails are coming from true organization. Phishing
techniques to detect these attacks so that they can be easily attacks main aim is to find the weaknesses of the target user.
dealt with in case one of them occurs. The paper gives a Attacker always finds the ways that causes users to visit a
thorough analysis of various Phishing attacks along with their phishing website. The Spoofed emails are designed in such
advantages and disadvantages. a manner that they often look professional and the users are
easily targeted and befooled.
This paper consists of four sections. First section consists of
Keywords—Phishing attack; Social engineering attack;
spoofed email; Personal data;
introduction; section 2 illustrates Literature Survey and
types of Phishing attacks, Section 3 explains widely
Prevention from Social engineering attacks, Section 4
I.INTRODUCTION explains Analysis on social engineering attacks detection
techniques, followed by Conclusion in Section 5.
The main aim of information security is to protect the
sensitive information from the social engineering attack
such as phishing attack, and money laundering. Social II. LITERATURE SURVEY
engineering attack is an art of manipulating the people who Phishing attack is a cybercrime; the attacker manipulates
have less knowledge about these types of attack. Every people to elicit their personal data. It is a great security issue
organization has security issues thathave been of great in the society. There are many techniques and numbers of
concern to users, site developers, and specialists, in order to solutions present today in order to prevent from these types
defend the confidential data from this type of social of attack; however users are providing personal information
engineering attack. on phishing webpage making it difficult for Programmers.
Phishing is a serious problem in the progressively limitless Many toolbars are available for different browsers which
service of the internet. There are many ways to trick the attempt to warn the people of likely phishing sites,
people to disclose the information from the user by using attempting users to further open them. Now this attack is
social engineering attack [1]. Phishing attack is one of the known as spear phishing. It makes harder for users to
common and popular amongst all. In this, the attacker bait distinguish between legitimate and spoofed email. Spoofed
the users by sending mails such as prize winning, send email being starting of Phishing attacks causes great harm to
message from fake account on social networking sites, user‟s authentication.
hacking password , send emails to victims which seems like
538
secure and secret. You have to use antivirus software to You should take care of hidden file extension, windows
prevent from these types of attack. Antivirus software is hides the last extension of a file by default. Eg: looking
crucial to keep your computer good and healthy. The as “Susie.jpg” may be “Susie.jpg.exe”- it is an
password should be 3D; it can use numbers, alphabet and
executable Trojan, this helps to reduce the chances of
special character.
being tricked .
D. Trojan horse detection: -There are some points to
prevent system from Trojan horse. IV.ANALYSIS OF SOCIAL ENGINEERING ATTACK
You must be careful when you download a file from the DETECTION TECHNIQUES
internet, it is often just a matter of time before you fall
Other techniques to preventing phishing attack and their
victim to a Trojan horse. result, we discuss some technique which is used to prevent
If a file comes from your office friend, you must be from social engineering attack as phishing attack. Now
confident what the file is, before disclosing it because day‟s phishing have become too smart such that sometimes
many Trojans will try to spread themselves in the friend skillful people can‟t be able to distinguish between
list using an email address book. suspicious and legitimate pages then we used surf [9]
technique to distinguish.
3. Ontological model to Francois Mouton 2014 In this model we describe about an Provide depth This model doesn‟t
detect social attack framework how the attacker knowledge about social provide security to the
engineering attack[12] easily targets the user and what is the engineering attack. information but its help
process to be done by the attacker. This frame work is us to how can I prevent
The process of this model is based on used for education and our data.
kevinmitnick„s social engineering awareness purpose.
attack cycle.
4. Anti Phishing tool Jordan crain 2010 These tools are effective in Protected from all Lack of knowledge
identifying phishing websites but attack factors, provide (many number of user
even if they were mostly correct, user a reliable means of can‟t understand that
ignore their warning anyway. detecting phishing type of warning).
emails.
5. Authentication SudanthaGunawar 2013 In this we used steganography It is more secure For password securing
technique to reduces dena techniques to hide our profile. The technique to hide our no proper formwork is
phishing attack password strength should not be password from the suggested in social
weak. This methodology is that the attacker. engineering.
user password may be an image that
is the authentication process to
identified user.
6. Link Guard NareshVidya 2013 This technique is used to analyzing The false negative The main disadvantage
Algorithm[17] Sagar the difference between visual and point is less in this of this technique is that
actual link. It is also used to calculate technique and 95% it works with windows
the similarities of a URI with a phishing website is XP. Now, many users
legitimate website(trusted site) recognized by this are using widow‟s other
algorithm. version e.g. windows7,
windows 8 and
windows 10.
539
V. CONCLUSION [9] H.Bay, T.Tuytelaars and L. Van Gool, “SURF: Speeded
UP robust Features.” European Conference on Computer
Vision (ECCV), Springer Berlin,2006, pp. 400-417.
Social engineering attack as we discussed is a [10] F. Mouton, L. Leenen, M. M. Malan and H.S. Venter, “
technique where attackers try to manipulate or fool Towards an Ontological Model Defining the Social
users. Our paper dealt with one of the most Engineering Domain” 11th Human Choice and Computers
International Conference, Turku , pp. 266 - 279, July 2014
common type of Social Engineering attack named [11] M. Fujikawa and M. Nishigaki, “A Study of Prevention
Phishing Attack. Phishing attack is very difficult to for Social Engineering Attacks using Real/Fake
detect because many people are unaware of it. Organization‟s Uniforms,” Sixth International Conference
There are many numbers of tools present to on Availability, Reliability and Security , 2011, pp. 597-
602
identify a phishing websites which warns the
[12] searchsecurity.techtarget.com/definition/email-
clients about the malware present in the website,
spoofing{accessed.online 10 October, 2015}
but most of the users ignore the warning. There are [13] https://en.wikipedia.org/wiki/hacker {accessed. online 28
many techniques to detect social engineering attack October, 2015}
however we cannot stop it. We discuss in our paper [14] https://blog.returnpath.com/10-tips-on-how -to-identify-
types of phishing attack and how to prevent from it. a-phishing-or-spoofing-email-v2 {accessed. online 2
How can people escape from attacks and what they December, 2015}
can do in such type of situation? [15] searchsecurity.techtarget.com/definition/Trojan-Horse
One solution to these attacks is that the user should {accessed. online 12 November, 2015}
copy the linkand open it with a new browser; from [16] [www.wikihow.com/prvent-hacking {accessed. online 12
this the user can recognize that the webpage is January, 2016}
suspicious or legitimate. There are a number of [17] U. Naresh, U. VidyaSagar and C. V. Madhusudan Reddy,
open source websites available which identifies the “Intelligent Phishing Website Detection and
authenticity of the link, website, or a webpage. Prevention System by Using Link Guard Algorithm” IOSR
Apart from this there are many algorithms which Journal of Computer Engineering (IOSR-JCE) 2013, vol.
can be used to detect Phishing attack, example: - XIV, pp 28-36
link guard algorithm and surf detector. Though
there is a weakness associated with these [18] www.wikihow.com/Tell-if-Your-Computer-Is-Infected-
algorithms, they have been implemented up to by-a-Trojan-Horse {accessed. Online 17 January , 2016}
windows XP only. In future we would like to
implement it for the windows 7, 8, 10 and updated
windows versions, since most of the users today
use these versions.
REFERENCES
[1] F. Mouton, M. Malan, L. Leenen and H.S. Venter, “Social
Engineer Attack Framework,” IEEE Conference on
Information Security for South Africa , 2014, pp. 1 - 9.
540