The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names

The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names

Erkan Şen, Gurkan Tuna
DOI: 10.4018/978-1-6684-3380-5.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet technology and its infrastructure are getting more and more into our lives. In parallel with this, there is an increase in the number of phishing attacks that rely on fake/deceptive domain names. Web-based phishing attacks aim at obtaining users' (individual/corporate) personal and/or financial information by using fake domain names. Within the scope of this chapter, firstly, phishing attacks are explained. How they are prepared and implemented is examined. Then, the steps to be taken to detect fake domain names to which users are directed are examined.
Chapter Preview
Top

Introduction

With the emergence of internet technologies in all areas of life, the number of attacks has begun to increase rapidly. Identity theft has emerged as a type of attack with many financial, military and commercial goals. Web phishing attacks, on the other hand, have become one of the most used methods for identity theft. Phishing attacks carry out these attacks by convincing that the web application they are in is real and they can cause great harm to both the relevant users and the targeted institutions such as the loss of reputation and money (Kalaycı, 2021).

As the internet usage and internet fraud headlines reflected in the news increase, users' interest in this subject also increases. For this reason, attackers are using more sophisticated and convincing methods for phishing attacks every day. According to the Anti-Phishing Attack Working Group (APWG) 2021 Q1 report, the number of unique phishing sites detected on the Internet has reached 611,877 in total. Table 1 reveals the magnitude of the threat (Anti Phishing Work Group, 2021).

Table 1.
Web phishing statistics Q1 2021
Number of JanuaryFebruaryMarch
Number of unique phishing sites detected245,771158,898207,208
Number of unique phishing email headers172,793112,36939,918
Number of brands targeted by phishing campaigns430407465

In phishing attacks, attacks are prepared using different methods, depending on the target population/institution and the desired result. Although the used methods vary, the main point where the attackers build the attack is the domain name. Web phishing attacks are widely used today to deceive end users and seize their information. Therefore, it is imperative for institutions to take measures against these attacks. For individuals, the high probability of success of these attacks and the scarcity of measures should also be taken into account. With on-site detection and notification, end-users' exposure to these attacks can be minimized.

Key Terms in this Chapter

Cyber Threats: It refers to malicious attacks by an individual or organization to get access to another individual’s or organization’s system or computer network with the purpose of corrupting data or stealing sensitive information.

Social engineering: It refers to a broad range of malicious activities performed through human interactions. It uses psychological manipulation to trick users into revealing sensitive information or making security mistakes.

Phishing: It is a kind of fraudulent attempt to obtain confidential data or sensitive information by impersonating oneself as a trustworthy entity in digital communications.

Spam: It refers to unsolicited communications sent in bulk through electronic messaging systems or over the internet.

Complete Chapter List

Search this Book:
Reset