<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Serhii Buchyk, Dmytro Shutenko and Serhii Toliupa</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Bohdan Hawrylyshyn str. 24, Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>URL's having</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1919</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>It is safe to say that the number of phishing attacks is dramatically increasing each year as the world becomes more and more digital. Security specialists are doing a good job developing social engineering countermeasures but there is an increasing workload to be dealt with as attackers constantly come up with more sophisticated ways to deceive workers. This work features approaches used for phishing detection: human and technology-based. It also discusses issues associated with both those methods and addresses the difficulty of eliminating phishing altogether. While using technology can lessen the burden on humans, a balance must be achieved where there is no complete reliance on either humans or technology as both have proven to have their own flaws. detection. social engineering, phishing, mitigation methods, human based detection, technology based</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Phishing is a cyber-criminal activity where a social engineer baits its target for information and
passwords by masquerading as a trustworthy party. Before it was popular on the Internet, phishing was
performed by phone, and the technique was referred to as vishing [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The current method of phishing
over the Internet is most often carried out in the form of an e-mail or pop-up directing the target to a page
similar to the page target is well familiar with, this page usually will prompt the user to enter their
credentials either to log in to engage in a fabricated scenario, the rest is history. Mail-out is another
phishing technique social engineers use to gather information. An example of a mail-out is a survey
given to employees of an organization where they are asked to answer a few questions of ‘their
company's IT department’. Mail-out is a technique that can also be used to spread malware, usually
attached to the files sent out to the target [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Interestingly enough, attached files don’t even have to be
executable from the first look. It means that a file with any kind of extension can conceal a potential
threat of data breach which is a very unwanted event for any business, state institution or simply a private
individual.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Task formulation</title>
      <p>display of their flaws.</p>
      <p>The aim of the study is research and efficiency analysis of known phishing attacks detection methods,
The object of research is the process of detecting phishing attacks.</p>
      <p>The subject of research is methods for phishing attacks detection.</p>
      <p>Thus, the task is to analyse known methods for phishing attacks detection both human and technology
based, provide method to assess such systems’ effectiveness in given scenarious and discuss potential
flaws associated with deployment and utilization of such systems.</p>
      <p>2022 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Solving the task</title>
      <p>
        Phishing attacks can be divided into two categories, which are human based social engineering which
includes real-life direct physical interaction with its human victim through phone, and also
technologybased social engineering such as online social networks impersonation, website phishing scams, and
email phishing [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. For the past decades, numerous researchers all around the world have been studying
ways to detect and prevent social engineering attacks. Figure 1 illustrates the taxonomy of phishing
detection methods known to date. The following few paragraphs of the article will focus on discussing
both types of phishing detection methods as well as the approaches information security specialists
could take advantage of on their way to preventing the leak of sensitive data.
      </p>
      <p>
        Human based detection methods involve human intervention in detecting and preventing phishing
attacks. Human based detection focuses more on the judgment of humans to determine whether the
activities that they have encountered are in any way related to social engineering attacks. Historically
it was the first and for some time the only available at the time method to detect social engineering
attacks due to the absence of automated systems, it is therefore quite well researched. Currently, there
are three approaches that can be classified in human based mitigation. Those are policy, auditing, and
also education, training and awareness approaches that will be discussed in the following paragraphs.
The importance of these approaches is well highlighted in studies [
        <xref ref-type="bibr" rid="ref10 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3-10</xref>
        ] that have researched phishing
attacks mitigation methods using human decision-making.
      </p>
      <p>
        Education, training and awareness (ETA) approach in detecting social engineering is one of the best
researched approaches in human based mitigation. Many works including [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] emphasized that employee
education is important to ensure the policies, procedures and standards that have been developed in the
organization are to be deployed effectively. It is also suggested that ETA must be implemented
especially for the newly employed staff in their orientation phase right after onboarding ends. ETA is
best implemented by developing interactive social engineering awareness websites for staff training
promoting personnel awareness of social engineering attack vectors. This interactive learning and
education game-based system proved to be an effective education tool in providing the users of this
system with knowledge and experience in spotting social engineering and its attack patterns [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. It is
also the modular-based design of the environment that can be particularly handy as the system is to be
updated with the latest trends and additional techniques of social engineering attacks in hours as
opposed to days needed to develop a brand new platform. This method proves to be vital as most victims
fall for phishing attacks because they lack knowledge about the attack vectors and are ignorant of
passive warnings from security tools regarding phishing attacks. There is no doubt security training if
done right help employees enhance their classification accuracy and teach them to take necessary action
in preventing them more often.
      </p>
      <p>
        Well established organizations are known to enforce certain rules developed to help personnel in
detecting and preventing social engineering attacks including phishing. These rules are usually directed
by policies that guide personnel on how to analyze and make a decision whether the situation they
encountered is indeed a social engineering attack or a legitimate activity. Their further actions should
also be part of a well-documented procedure to make sure the staff doesn’t become the reason of data
breach or having a malicious actor in the organization’s corporate network. Most important bits of data
in policies modern organizations simply can’t function without are the following. Clear desk policy to
prevent password or sensitive information being left lying about; paper shredder usage procedure to
undermine dumpster diving attempts; identification checking policy (implementation of caller ID
technology for phone calls and service personnel); rules of defining sensitive information in an
organization, authorization and access control policy, data classification policy and security policies
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. As proposed by the Colorado Department of Education in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Audit controls and effective security
safeguards are part of normal operational management processes to mitigate, control, and minimize
risks that can negatively impact business operations and expose sensitive data.
      </p>
      <p>
        Auditing is complimentary to the policy-based approach as mentioned in works [
        <xref ref-type="bibr" rid="ref5 ref7">5,7</xref>
        ]. While auditing
is often used to inspect or examine processes or systems to ensure compliance with requirements, our
interest towards auditing lies in testing the level of user awareness or exposure to social engineering
attacks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This approach is frequently used to ensure the effectiveness of policies and ETA conducted
in an organization against attacks. One key difference between processes and ETA + Policy auditing
lies in the nature of phishing attacks. Since new attack vectors are emerging quite often, it makes perfect
sense to carry out auditing procedures with higher frequency than those that assess processes or systems.
      </p>
      <p>
        Approaches mentioned in previous paragraphs are the most fundamental and common
countermeasures in detecting and preventing social engineering attacks including phishing. Policy,
auditing and ETA for users and employees in the organizations are a must as social engineering preys
on psychological traits in exploiting their victims [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>We can’t argue that other technology based detection solutions help users to recognize the attacks,
but at the end of the day, it depends solely on the decision-making and action taken by those very users
so that they classify the situation they encountered as suspicious and take necessary measures as pointed
out in procedures for dealing with potential social engineering attacks. Human judgment is undoubtedly
somehow subjective and even with good knowledge, awareness and policy against this type of threat,
social engineers can find multiple ways to convince their victims and exploit human psychology to gain
information or access to sensitive information causing data leaks or other malicious activity. Therefore,
there is a need for technology based mitigation methods as complimentary to human based mitigation
to increase the overall detection and prevention accuracy.</p>
      <p>
        According to Kevin Mitnick, another problem is that the most popular targets for social engineering
exploitation are new employees. Mitnick argues this is because new employees and interns are one of
the weakest links in an organization. They may not yet have completed ETAs and do not possess
sufficient knowledge about the company’s sensitive information assets, as well as they are not familiar
with all the staff within the organization or relevant business processes they became a part of. As one
would expect, they can be easily fooled. What appears even more striking is that according to [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] even
with the best security education, awareness and training programs in place, new employees will always
represent a threat. Therefore, the best approach information security officers might take to avoid such
a scenario would be to limit new employees’ access to sensitive organizational assets. The challenge
here is that by doing so, staff that has just been on-boarded would simply become incapable of carrying
out their duties as there would be an obstacle to accessing the information and resources that are
required to get the job done.
      </p>
      <p>Another set of methods used for detecting and preventing phishing attacks takes advantage of a wide
range of technology based solutions. Technology based mitigation methods entered the equation as
soon as phishing become more widespread and users were in urgent need of both email filtering
solutions and website checkers to do some analytical job for them in the background. Since then it’s
been a constant bout between hackers and security specialists that both developed more and more
sophisticated methods to outperform one another. Technology based mitigation methods have been
well-researched in detecting and preventing social engineering attacks in the last decade. Several
categories represent this method. In the next few paragraphs of this work an overview of the following
phishing technology based detection methods will be presented:
1. heuristic detection;
2. artificial intelligence and machine learning powered solutions;
3. biometrics;
4. social honeypots.</p>
      <p>
        First and foremost, there’s a variety of heuristic methods that detect phishing patterns with the help
of digital signatures or other identifiers, object properties, etc. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] phishing detection by heuristics
is defined as software that is deployed on the server or client side to inspect payloads of different
protocols via diverse algorithms. Protocol list includes HTTP, HTTPS, SMTP, POP3 or any arbitrary
protocol used to deliver content/emails to Internet users. Algorithms could be represented as any method
to detect and if configured so block phishing attempts automatically.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], the authors suggested an anti-phishing approach that examines webpage irregularities. The
method collects anomalies from a variety of sources, including URLs, page titles, cookies, login forms,
DNS data, and SSL certificates, among others. If a set of universal heuristic examinations are
recognized, as a result of comparing to a massive dataset of known malicious patterns, such software
might detect zero-day phishing attacks. Some may say that it doesn’t really give this approach a
competitive advantage over blacklists. Since blacklists require exact matches to detect phishing
websites, the exact same phishing attacks need to be examined first to blacklist them [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        However, as heuristic methods focus on signatures comprised of similar patterns, they are more
prone to identify malicious payload never seen before with higher probability which makes them more
flexible but at the same time creates a risk of misidentifying legitimate websites and producing false
positives disrupting normal workflow and unwanted system overhead. Mainstream mail clients and web
browsers have already begun to equip their services with phishing protection technologies, such as
heuristic based detectors that help at identifying phishing attacks. What is more, phishing detection
based on heuristics is incorporated in countless antiviruses so in a world where hackers didn’t tweak
their attacks it would be a matter of time before a perfect set of signatures could be created and used to
identify any potential threat. Secondly, there are more modern and powerful methods that only get better
with time - artificial intelligence and machine learning powered solutions. Algorithms they use learn
from massive databases of known phishing websites, emails or even SMS and therefore can spot a
suspicious entry with quite a high accuracy. Study [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] considers the phishing detection problem as an
AI-based classification problem wherein the result of the decision-making phase leads to detecting if a
given website is either a legitimate or a phishing website. In essence AI’s job is to conduct analisys of
ever-changing phishing patterns, determine the combinations of characteristics that should be used to
successfully identify malicious activity and filter out data that is no longer useful. Thus, consideration
of the AI algorithms as the basis for developing viable phishing detection models to combat phishing
threats in their evolving nature was made in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        In short, many AI-based solutions take advantage of systematized knowledge about significant
characteristics that have proven to be efficient in spotting elements phishing websites are prone to
possess as [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] suggests. Most commonly used characteristics or features as well as phishing website
attributes that can be used for phishing detection with high accuracy are featured in Table 1.
      </p>
      <p>Determining heuristic and artificial intelligence + machine learning powered methods efficiency for
phishing detection in theory is determined by correctly weighted set of attributes and their individual
entropy. Since it is exactly the job of AI and ML to determine most accurate estimate of each attribute
importance and hence assign higer weight to it, for this work we will come up with initial values based
on existing knowledge and as such obtained results will reflet the effectiveness of the most primitive
heuristic-based phishing detection system in percentage from 0% to 100%.</p>
      <p>To get each individual attribute entropy, slightly modified Shannon’s concept will be taken up.
Formula 1 is used to calculate it</p>
      <p>Hattribute  p1 logs (1 / p1)  p2 logs (1 / p2 )  ...  ps logs (1 / ps ) ,
where p1, p2... ps are the probabilities of attribute having unique values, s is the number of unique
values for a given attribute.</p>
      <p>Sample distribution of attributes’ weights and unique values with their probabilities can be used as
such given in Table 2 and Table 3 respectively. Effectiveness of a system is a product of all weighet
attributes’ entropies. Formula 2 is used to calculate it.</p>
      <p>k
E   w H</p>
      <p>i i
i1
where Hi and wi are entrophy and a weight of a given attribute respectively, k is the number of
attributes considered for a given system.</p>
      <p>Eventually, having extended the list of attributes and their probable values and probabilities, the data
can be fed into machine learning model for it to determine the weights of each attribute so that peak
efficiency can be reached. What is more, this approach of system efficiency assessment can be used to
determine attributes which no longer provide any use for phishing elements detection.</p>
      <p>
        The reason ML approaches became popular for phishing detection is because they made it a simple
classification problem. Training of ML model for a learning-based detection system requires the data
at hand must-have features that are related to phishing and legitimate website classes mentioned earlier.
Previous studies show that detection accuracy is high as robust ML techniques are used; those are
kNearest Neighbor (KNN), Random Forest, and Support Vector Machine (SVM) to name a few. Figure
2 [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] illustrates one of the scenarios used to train a ML model to differentiate phishing websites from
legitimate ones. Each algorithm has a little-to-no influence on the common approach taken for machine
learning: a dataset of entries containing phishing has to be used anyway. In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] it was discovered that
the Random Forest model proved to deliver the best performance in a given setting. This algorithm is a
collection of Decision trees with each tree differing slightly from the other. A prediction is made by
averaging the result obtained from all individual Decision Trees. This helps to reduce the problem of
overfitting, a problem peculiar to the Decision Tree Algorithm.
      </p>
      <p>
        Thirdly, since social engineers are frequently attempting to impersonate a trustworthy party by
creating a fake profile and mimicking its identity through visual appearance, use of lingo and knowledge
of internal business processes a method that can counteract physical impersonation is using biometrics
(1)
(2)
as it does not rely on the perceived identity of a person, but rather distinguishes someone using their
unique biological traits such as fingerprint, voice or facial recognition [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>Sample Distribution of attributes’ weights for a given set of attributes</title>
        <p>Existence of
‘HTTPS’ in the
domain part of the
URL
Using URL
shortening
services
Sub domain and
multi sub domains
HTTPS (HTTP
with SSL)
Redirecting using
‘//’</p>
      </sec>
      <sec id="sec-3-2">
        <title>Sample set of unique values with their probabilities for a given attribute</title>
        <p>Attribute: Links in &lt;Meta&gt;, &lt;Script&gt; and &lt;Link&gt; tags</p>
        <p>Values
No links in any of the tags
Links in &lt;Meta&gt; tag only
Links in &lt;Meta&gt; and &lt;Script&gt; tags
Links in &lt;Meta&gt; and &lt;Link&gt; tags
Links in &lt;Script&gt; tag only
Links in &lt;Script&gt; and &lt;Link&gt; tags
Links in &lt;Link&gt; tag only
Links in all the tags</p>
        <p>Biometric systems have improved significantly in recent years and visual disguises that may fool a
human will not be successful when confronted with them. It’s important to state that in comparison with
other approaches to phishing detection, this one requires a more specific setting to be of any use.
Apparently, biometric detection can only be useful if the attacker is forced to be subjected to this kind
of test. An example would be using two or even three-factor authentication for an account one of which
is biometrically enforced. Last but not least, there are systems called honeypots that imitate an existing
working system to trap attackers and learn their behavior patterns to develop better signatures as well
as relevant phishing patterns for further automatic filtering. Honeypots can be implemented in any form
including a website, network, or computer. While it’s traditionally used to defend against threats such
as malware and database attacks, it can be also utilized to learn more about email attacks and spam
attacks.</p>
        <p>Honeypot is primarily used to gather data points on hacker’s actions that will be further used to form
a data set that will eventually be fed for training (ML models are discussed in more detail in previous
paragraphs). Therefore, the main purpose of using honeypot auto harvest of information based on
hacker’s activities on the system, filter certain activities and develop a statistical user model.</p>
        <p>
          For social media honeypots, detection for spamming and phishing will need manual work with
personnel operating the honeypot profile as many spam works are in form of video, image, text and
social network features being manipulated [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Having collected enough input data, statistics can be
drawn to differentiate between real profiles, fake profiles, spam profiles or bot profiles and
automatically filter our unwanted entries in the future. The use of technology is often accompanied by
added cost, complexity and overall system overhead. The systems that have been mentioned in this
work would require a significant financial investment by an organization in most cases without a clear
measure of cost-benefit once they will be deployed. Thus, spending large amounts of money on such
systems, their training, deployment, management and maintenance can be irrelevant. The added
complexity of the systems also means that there is potential for a business process to be interrupted in
case those systems malfunction yielding false positives one after another.
        </p>
        <p>While heuristic detection methods do quite well in terms of spotting known phishing patterns,
researchers argue they barely outperform simple blacklists but create substantial system overhead as
they require a signature of the entry to be built every single time and then comparing it to countless
known signatures in a given database. Such solutions can be useful in case a snippet can be sent to the
cloud, analyzed and compared with known signatures and then the result should be sent to the host
notifying the user of a potential threat or filtering out such content automatically even before the user
can see it (especially useful with emails and their attachments). In case all processes associated with
payload analysis take place on the host machine it is expected to overwhelm a system and lead to
noticeable freezes interfering with normal workflow.</p>
        <p>
          Artificial intelligence systems usually require large datasets and long periods of training to be
effective. In [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] authors argue the issue is that the datasets required are hard to come across unless
there have been specific efforts to gather samples. The datasets themselves may also be of limited use
as they become outdated if not updated with newly detected samples. Older datasets are becoming
obsolete because of the phishing attacks’ nature, as soon as defense mechanisms manage to detect and
mitigate them automatically, hackers come up with more sophisticated approaches. Another thing worth
mentioning is that the information-gathering process itself can be subject to inaccuracy and therefore
high false positive rate, making the system inconvenient rather than effective. Not to mention the
unpredictability of machine learning algorithms and the time needed to train, test and deploy them.
        </p>
        <p>
          Biometrics-based systems can be bypassed using piggybacking, tailgating or other social
engineering tactics. The attacker can also exploit the technological vulnerabilities of the security
systems on-premise, thus avoiding detection. In [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] it was shown that biometric systems are especially
vulnerable to targeted impersonation attacks without manipulating the actual mechanisms of the device.
This creates an opportunity for a social engineer to manipulate authentication devices and avoid
detection. All things considered, biometrics is a good tool to prevent unauthorized physical access to
facilities but offers little-to-no competitive advantages to other methods of phishing detection.
        </p>
        <p>
          Despite being quite a progressive technological solution honeypots are banned in some countries as
it is against user privacy rights to collect data generated by their browsing activity. Even though it
sounds ridiculous taking into consideration modern-day cooking policy of Google or Meta products,
according to [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] proactive security specialists can be charged with a breach of privacy. Therefore, a
thorough analysis of a legal aspect has to be carried out before developing and adding such systems.
Another problem is that honeypot is a relatively new approach and not many accurate datasets are
collected, which makes the ratio of false positive and false negative quite high, which results in
inaccurate system execution. Thankfully, now this data doesn’t need to be analyzed by engineers, in
contrast, it can be fed into the ML model and further used to determine the most prominent detection
attributes and malicious actor behavior patterns to generate warnings or block similar activity in the
future. Hence, it is not fair to say that technologies address phishing threats with no complications
associated with their utilization and in most cases company’s CISO or CEO has a tradeoff between
spending little money on security and having a badly protected but fast network that ensures smooth
business processes continuity and spending more money on security systems and being sure technical
solutions are there to protect company’s information assets from expected threats.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>
        Our increasing reliance on the Internet for much of our day-to-day operations has created the ideal
setting for fraudsters to launch targeted phishing assaults [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. It is nowhere to hide from so measures
must be taken to alleviate risks of data breaches and loss of companies’ informational assets as a result
of employee carelessness. In this work, phishing was discussed as one of the most sophisticated types
of social engineering attacks that takes advantage of human psychological weaknesses. Phishing attacks
have been a threat to both organizations and individuals for a very long time and although it has been a
known threat with many cases of security incidents involving social engineering, to date there has not
been a clear answer on how to deal with this threat and thoroughly mitigate it.
      </p>
      <p>For a long time, it has been proposed that any social engineering threat can be prevented through the
use of security policies, ETA of employees and establishing a security culture within the organization
and regular audits. Taking into consideration the nature of such attacks nowadays – more complex
solutions have to be used. It has been discussed that human based detection methods are simply no
longer enough on their own as naive adoption of best security practices does not guarantee good security
posture of the organization.</p>
      <p>It has been shown that various technology-based solutions exist to automate phishing detection.
These technological systems can lessen the impact of human weakness in detecting attacks as they
occur. Among the measures presented were those that used heuristic detection, systems powered by AI
and ML, biometrics and social honeypots that can be used to progressively learn about and adapt to
ever-changing social engineering tactics. However, relying on technology also has its drawbacks in
terms of cost, management and maintenance.</p>
      <p>An approach to assess technology-based systems effectiveness in terms of website phishing elements
detection has been offered. Since it has website attributes that are most often analysed in search of
phishing patterns at it’s foundation – the system can be improved by extending the list af attributes,
their values and probably combinations of other factors.</p>
      <p>The threat of social engineering and thus phishing can never be totally eliminated as long as an
organization requires human beings to do the job systems are not yet capable of. Using
technologybased solutions can lessen the burden on humans in providing security, though a balance must be
achieved where there is no total reliance on either of those methods as both have their own issues and
weaknesses. Moving forward, the best thing that can be done to combat social engineering and phishing
in particular is to continue researching how organizations are being exploited, use honeypots to learn
more about attackers’ behavior, improve existing security standards and develop new solutions to detect
and mitigate existing and emerging threats.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Terranova</given-names>
            <surname>Security</surname>
          </string-name>
          , WHAT IS VISHING? URL: https://terranovasecurity.com/what-is-vishing.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Mitnick</surname>
            ,
            <given-names>K. D</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Are You The Weak Link</article-title>
          .
          <source>Harvard Business Review</source>
          ,
          <volume>81</volume>
          (
          <issue>4</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Peltier</surname>
            ,
            <given-names>T. R.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Social Engineering: Concepts and Solutions</article-title>
          .
          <source>Information Systems Security</source>
          . Volume
          <volume>15</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>13</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Khonji</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et. al. (
          <year>2013</year>
          ).
          <article-title>Phishing Detection: A Literature Survey</article-title>
          .
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          . Volume
          <volume>15</volume>
          (
          <issue>4</issue>
          ),
          <fpage>2091</fpage>
          -
          <lpage>2121</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Twitchell</surname>
            ,
            <given-names>D. P.</given-names>
          </string-name>
          <year>2006</year>
          .
          <article-title>Social Engineering In Information Assurance Curricula</article-title>
          .
          <source>Proceedings Of The 3rd Annual Conference On Information Security Curriculum Development</source>
          .
          <fpage>22</fpage>
          -
          <lpage>23</lpage>
          September. Kennesaw, Georgia, United States: ACM, pp.
          <fpage>191</fpage>
          -
          <lpage>193</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Information</given-names>
            <surname>Systems Audit</surname>
          </string-name>
          <article-title>Policy</article-title>
          . URL: https://www.cde.state.co.us/dataprivacyandsecurity/informationsystemsauditpolicy
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Algarni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chan</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tian</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Social engineering in social networking sites: Affect-based model</article-title>
          .
          <source>8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)</source>
          ,
          <fpage>508</fpage>
          -
          <lpage>515</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papadaki</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furnell</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Improving Awareness of Social Engineering Attacks</article-title>
          . In: Dodge,
          <string-name>
            <given-names>R.C.</given-names>
            ,
            <surname>Futcher</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (
          <article-title>eds) Information Assurance and Security Education and Training</article-title>
          .
          <source>WISE WISE WISE</source>
          <year>2013</year>
          2011
          <year>2009</year>
          .
          <article-title>IFIP Advances in Information and Communication Technology</article-title>
          , vol
          <volume>406</volume>
          . Springer, Berlin, Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Siponen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Mikko</surname>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Information security standards focus on the existence of process, not its content</article-title>
          .
          <source>Commun. ACM</source>
          .
          <volume>49</volume>
          .
          <fpage>97</fpage>
          -
          <lpage>100</lpage>
          .
          <fpage>10</fpage>
          .1145/1145287.1145316.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Kevin</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Mitnick</surname>
          </string-name>
          , William L. Simon, Steve Wozniak, John Willey &amp; Sons publisher (
          <year>2002</year>
          ), - “
          <source>The Art of Deception”.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Khonji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Iraqi</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Jones</surname>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>"Phishing Detection: A Literature Survey"</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>2091</fpage>
          -
          <lpage>2121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Poderys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Artuso</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. M. O. Lensbl</surname>
            ,
            <given-names>H. L.</given-names>
          </string-name>
          <string-name>
            <surname>Christiansen</surname>
          </string-name>
          and J.
          <string-name>
            <surname>Soler</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>"Caching at the mobile edge: A practical implementation"</article-title>
          ,
          <source>IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>8630</fpage>
          -
          <lpage>8637</lpage>
          , Feb.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Ahmed</given-names>
            <surname>Nafies Okasha Mohamed</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver</article-title>
          UNIVERSITY OF TARTU.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Hamad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gao</surname>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>"A deep-learning-driven lightweight phishing detection sensor"</article-title>
          ,
          <source>Sensors</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>19</issue>
          , pp.
          <fpage>4258</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y. A.</given-names>
            <surname>Alsariera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Adeyemo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Balogun</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Alazzawi</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>"AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>8</volume>
          , pp.
          <fpage>142532</fpage>
          -
          <lpage>142542</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>M. D. Bhagwat</surname>
            ,
            <given-names>P. H.</given-names>
          </string-name>
          <string-name>
            <surname>Patil</surname>
            and
            <given-names>T. S.</given-names>
          </string-name>
          <string-name>
            <surname>Vishawanath</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>"A Methodical Overview on Detection, Identification and Proactive Prevention of Phishing Websites,"</article-title>
          <source>Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)</source>
          , pp.
          <fpage>1505</fpage>
          -
          <lpage>1508</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Basit</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zafar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A comprehensive survey of AI-enabled phishing attacks detection techniques</article-title>
          .
          <source>Telecommun Syst 76</source>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>154</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.O.</given-names>
            <surname>Ojewumi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.O.</given-names>
            <surname>Ogunleye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.O.</given-names>
            <surname>Oguntunde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Folorunsho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.G.</given-names>
            <surname>Fashoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ogbu</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Performance evaluation of machine learning tools for detection of phishing attacks on web pages, Scientific African</article-title>
          , Volume
          <volume>16</volume>
          ,
          <year>e01165</year>
          ,
          <source>ISSN 2468-2276</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>JOURAU</surname>
          </string-name>
          ,
          <string-name>
            <surname>Chizari</surname>
            <given-names>Hassan</given-names>
          </string-name>
          , Zulkurnain Ahmad, Hamidy Ahmad, Husain
          <string-name>
            <surname>Affandi</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Social Engineering Attack Mitigation, VL - 1</article-title>
          , JO.
          <source>International Journal of Mathematics and Computational Science</source>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Bustard</surname>
            ,
            <given-names>J. D.</given-names>
          </string-name>
          et. al. (
          <year>2013</year>
          ).
          <article-title>Targeted Biometric Impersonation</article-title>
          .
          <source>International Workshop on Biometrics and Forensics (IWBF). 4-5 April</source>
          . Lisbon, Portugal: IEEE, pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Haddadi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <year>2010</year>
          . To Add Or Not To Add: Privacy and
          <string-name>
            <given-names>Social</given-names>
            <surname>Honeypots</surname>
          </string-name>
          .
          <source>IEEE International Conference on Communications Workshops (ICC)</source>
          .
          <volume>23</volume>
          -27 May. Capetown, South Africa: IEEE,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>M. M. Uddin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Arfatul Islam</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mamun</surname>
            ,
            <given-names>V. K.</given-names>
          </string-name>
          <string-name>
            <surname>Tiwari</surname>
          </string-name>
          , J.
          <string-name>
            <surname>Park</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <source>A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information</source>
          ,
          <source>2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI)</source>
          , pp.
          <fpage>220</fpage>
          -
          <lpage>224</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>