Mitigation strategies against the phishing attacks: A systematic literature review
| dc.contributor.author | Naqvi Bilal | |
| dc.contributor.author | Perova Kseniia | |
| dc.contributor.author | Farooq Ali | |
| dc.contributor.author | Makhdoom Imran | |
| dc.contributor.author | Oyedeji Shola | |
| dc.contributor.author | Porras Jari | |
| dc.contributor.organization | fi=kyberturvallisuusteknologia|en=Cyber Security Engineering| | |
| dc.contributor.organization-code | 2610304 | |
| dc.converis.publication-id | 180484714 | |
| dc.converis.url | https://research.utu.fi/converis/portal/Publication/180484714 | |
| dc.date.accessioned | 2025-08-28T03:37:16Z | |
| dc.date.available | 2025-08-28T03:37:16Z | |
| dc.description.abstract | <p>Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft. The paper presents a systematic literature review featuring 248 articles (from the beginning of 2018 until March 2023) across the main digital libraries to identify, (1) the existing mitigation strategies against phishing attacks, and the underlying technologies considered in the development of these strategies; (2) the most considered phishing vectors in the development of the mitigation strategies; (3) anti-phishing guidelines and recommendations for organizations and end-users respectively; and (4) gaps and open issues that exist in the state of the art. The paper advocates for the need to consider the abilities of human users during the design and development of the mitigation strategies as only technology-centric solutions will not suffice to cater to the challenges posed by phishing attacks.<br></p> | |
| dc.identifier.eissn | 1872-6208 | |
| dc.identifier.jour-issn | 0167-4048 | |
| dc.identifier.olddbid | 210906 | |
| dc.identifier.oldhandle | 10024/193933 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/56700 | |
| dc.identifier.url | https://doi.org/10.1016/j.cose.2023.103387 | |
| dc.identifier.urn | URN:NBN:fi-fe2025082792789 | |
| dc.language.iso | en | |
| dc.okm.affiliatedauthor | Farooq, Ali | |
| dc.okm.discipline | 113 Computer and information sciences | en_GB |
| dc.okm.discipline | 113 Tietojenkäsittely ja informaatiotieteet | fi_FI |
| dc.okm.internationalcopublication | international co-publication | |
| dc.okm.internationality | International publication | |
| dc.okm.type | A2 Scientific Article | |
| dc.publisher | Elsevier Ltd | |
| dc.publisher.country | Netherlands | en_GB |
| dc.publisher.country | Alankomaat | fi_FI |
| dc.publisher.country-code | NL | |
| dc.relation.articlenumber | 103387 | |
| dc.relation.doi | 10.1016/j.cose.2023.103387 | |
| dc.relation.ispartofjournal | Computers and Security | |
| dc.relation.volume | 132 | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/193933 | |
| dc.title | Mitigation strategies against the phishing attacks: A systematic literature review | |
| dc.year.issued | 2023 |
Tiedostot
1 - 1 / 1
Ladataan...
- Name:
- 1-s2.0-S0167404823002973-main.pdf
- Size:
- 2.71 MB
- Format:
- Adobe Portable Document Format