An introduction to journal phishings and their detection approach

20Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users' important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we'll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we'll check our suggested approach in error rate.

Cite

CITATION STYLE

APA

Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015). An introduction to journal phishings and their detection approach. Telkomnika (Telecommunication Computing Electronics and Control), 13(2), 373–380. https://doi.org/10.12928/TELKOMNIKA.v13i2.1436

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free