EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 4

Identifying Methods of Web Attacks towards Minimizing their Effects on Websites

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

PrintEmail

journal image
 Download
815
  • Joshua John and S. Z. Bugi and Muripshaka Yibis 2014. Identifying Methods of Web Attacks towards Minimizing their Effects on Websites. International Journal of Applied Information Systems. 7, 4 (June 2014), 9-14. DOI=http://dx.doi.org/10.5120/ijais451184
  • @article{10.5120/ijais2017451568,
    author = {Joshua John and S. Z. Bugi and Muripshaka Yibis},
    title = {Identifying Methods of Web Attacks towards Minimizing their Effects on Websites},
    journal = {International Journal of Applied Information Systems},
    issue_date = {June 2014},
    volume = {7},
    number = {},
    month = {June},
    year = {2014},
    issn = {},
    pages = {9-14},
    numpages = {},
    url = {/archives/volume7/number4/635-1184},
    doi = { 10.5120/ijais14-451184},
    publisher = { xA9 2013 by IJAIS Journal},
    address = {}
    }
    
  • %1 451184
    %A Joshua John
    %A S.  Z.  Bugi
    %A Muripshaka Yibis
    %T Identifying Methods of Web Attacks towards Minimizing their Effects on Websites
    %J International Journal of Applied Information Systems
    %@ 
    %V 7
    %N 
    %P 9-14
    %D 2014
    %I  xA9 2013 by IJAIS Journal
    

Abstract

This study set out to identify methods that phishers employ to attack unsuspecting internet users. The aim was for the purpose of minimizing their effects on websites as well as users. Eleven statements, namely, Emails, Web based, Malware based, Internet Relay Chats (IRC's) Man in the middle (MITM) Domain Name Server (DNS) based, Impersonate, Forward Attack, Pop-up attack, Voice Phishing and Mobile Phishing, depicting methods used by phishers to carry out their attacks against unsuspecting victims who are the internet users were presented to respondents to indicate their level of agreement. The result showed that only two, (MITM and Web based) out of the eleven were not significant while the remaining nine were significant. That means only the two strategies of attacks are not really dangerous as such can be ignored. This also indicates a high level of danger posed by phishers. Suggestion for further studies was made.

References

  1. Something Vishy, Be Aware of a New Online Scam FBI (2007).
  2. Anti-Phishing Working Group, 2009, p. 2.
  3. Christine E. D. , Jonathan J. O. and Eugene J. K. (2004). "Anatomy of a Phishing Email", First Conference on Email and Anti-Spam (CEAS). 2004 Proceedings.
  4. Christine, et-al 2004. "Anatomy of a Phishing Email", First Conference on Email and Anti-Spam (CEAS). 2004 Proceedings.
  5. FBI (2007). Something Vishy, Be Aware of a New Online Scam 2007.
  6. Gunter, O. (2009). "The Phishing Guide, Understanding & Preventing Phishing Attacks", Next Generation Security Software.
  7. James, L. (2005) Phishing Exposed. Oct, Syngress.
  8. Wikipedia, the free encyclopedia. http://en. wikipedia. org/wiki/Malware#Characteristics_of_data-stealing_malware. Retrieved on 30th April, 2014
  9. Rachna, D. , Tygar, J. D. (2005). "Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks", In Human Interactive Proofs: Second International Workshop (HIP 2005).
  10. Rob T. , and Jerry, M. (2010). "The underground economy: priceless"
  11. Shah, J. (2007) Online Crime Migrates to Mobile Phones. Sage, April. 1(2).
  12. Yue Zhang, S. E. , Lorrie C. , and Jason H. (2007). Phinding Phish Evaluating Anti-Phishing Tools. In 14th Annual Network & Distributed System Security Symposium (NDSS 2007). San Diego, CA.

Keywords

Botnets, Bucket bridge attack, Cyber Espionage, Phishing, web spoofing.

Index Terms

Computer Science
Information Sciences