Research Article | Open Access | Download Full Text
Volume 2 | Issue 4 | Year 2024 | Article Id: CYS-V2I4P103 DOI: https://doi.org/10.59232/CYS-V2I4P103
Simulating Phishing and Security Step (2FA) and Detecting Fake URLs Using Plugin and Browser Extension Detection
K. Dhivya, S. Anisha, V. Dheepa Muthu Jothi, S. Kavishree, R. Madhangi, M.G. Meena Abinaya
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 04 Oct 2024 | 10 Nov 2024 | 28 Nov 2024 | 21 Dec 2024 |
Citation
K. Dhivya, S. Anisha, V. Dheepa Muthu Jothi, S. Kavishree, R. Madhangi, M.G. Meena Abinaya. “Simulating Phishing and Security Step (2FA) and Detecting Fake URLs Using Plugin and Browser Extension Detection.” DS Journal of Cyber Security, vol. 2, no. 4, pp. 19-28, 2024.
Abstract
Keywords
Phishing attacks, Two-Factor Authentication (2FA), Phishing prevention, Phishing detection, User protection, Malicious links.
References
[1] Surachai Chatchalermpun, and Therdpong Daengsi, “Improving Cybersecurity Awareness Using Phishing Attack Simulation,” IOP Conference Series: Materials Science and Engineering, vol. 1088, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Muhammet Baykara, and Zahit Ziya Gürel, “Detection of Phishing Attacks,” 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, pp. 1-5, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Bhavya Shah et al., “Chrome Extension for Detecting Phishing Websites,” International Research Journal of Engineering and Technology, vol. 7, no. 3, pp. 2958-2962, 2020.
[Google Scholar] [Publisher Link]
[4] Adetokunbo MacGregor John-Otumu, Md Mahmudur Rahman, and Christiana Ugochinyere Oko, “An Efficient Phishing Website Detection Plugin Service for Existing Web Browsers Using Random Forest Classifier,” American Journal of Artificial Intelligence, vol. 5, no. 2, pp. 66-75, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] T.O. Oyegoke, A.O. Amoo, and J. Aigberua, “An Enhanced Phishing Detection System in Online Transactions,” Twist, vol. 19, no. 3, pp. 656-666, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Vaishnavi Bhavsar, Aditya Kadlak, and Shabnam Sharma, “Study on Phishing Attacks,” International Journal of Computer Applications, vol. 182, no. 3, pp. 27-29, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Zainab Alkhalil et al., “Phishing Attacks: A Recent Comprehensive Study and A New Anatomy,” Frontiers in Computer Science, vol. 3, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Ankit Kumar Jain, and B.B. Gupta, “A Survey of Phishing Attack Techniques, Defence Mechanisms and Open Research Challenges,” Enterprise Information Systems, vol. 16, no. 4, pp. 527-565, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Bilal Naqvi et al., “Mitigation Strategies against the Phishing Attacks: A Systematic Literature Review,” Computers & Security, vol. 132, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Anirudha Joshi, and Tanuja R. Pattanshetti, “Phishing Attack Detection Using Feature Selection Techniques,” Proceedings of International Conference on Communication and Information Processing (ICCIP), pp. 1-7, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ram B. Basnet, Andrew H. Sung, and Quingzhong Liu, “Rule-Based Phishing Attack Detection RB Basnet,” International Conference on Security and Management, 2011.
[12] Muhammad Nadeem et al., “Phishing Attack, its Detections and Prevention Techniques,” International Journal of Wireless Security and Networks, vol. 1, no. 2, pp. 13-25, 2023.
[Google Scholar] [Publisher Link]
[13] G. Jaspher Willsie Kathrine et al., “Variants of Phishing Attacks and their Detection Techniques,” 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, pp. 255-259, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ozgur Koray Sahingoz, Saide Işılay Baykal, and Deniz Bulut, “Phishing Detection from URLs by Using Neural Networks,” Computer Science & Information Technology (CS & IT), pp. 41-54, 2018.
[CrossRef] [Google Scholar] [Publisher Link]