{"title":"不要上钩:网上银行(电子银行)的网络钓鱼攻击","authors":"Ilker Kara","doi":"10.58940/1558-7223.1743","DOIUrl":null,"url":null,"abstract":"Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirection, panic, curiosity, or excitement. Most phishing websites are designed on internet banking(e-banking), and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, attackers’ attack techniques and strategies from actual phishing attacks are essential to study and analyze. This study focused on the detection and analysis of a real e-banking phishing attack using the phishing website. Analysis results show that the attacker’s information is traceable.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)\",\"authors\":\"Ilker Kara\",\"doi\":\"10.58940/1558-7223.1743\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirection, panic, curiosity, or excitement. Most phishing websites are designed on internet banking(e-banking), and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, attackers’ attack techniques and strategies from actual phishing attacks are essential to study and analyze. This study focused on the detection and analysis of a real e-banking phishing attack using the phishing website. Analysis results show that the attacker’s information is traceable.\",\"PeriodicalId\":351663,\"journal\":{\"name\":\"J. Digit. Forensics Secur. Law\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Digit. Forensics Secur. Law\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58940/1558-7223.1743\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Digit. Forensics Secur. Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58940/1558-7223.1743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)
Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirection, panic, curiosity, or excitement. Most phishing websites are designed on internet banking(e-banking), and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, attackers’ attack techniques and strategies from actual phishing attacks are essential to study and analyze. This study focused on the detection and analysis of a real e-banking phishing attack using the phishing website. Analysis results show that the attacker’s information is traceable.