A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

A comprehensive examination of email spoofing: Issues and prospects for email security

SC Sethuraman, DP VS, T Reddi, MST Reddy… - Computers & …, 2024 - Elsevier
Attackers are becoming more skilled in recent years, using sophisticated technology to
produce look-alike emails that make it difficult to distinguish between real and fake ones …

ZDNS: a fast DNS toolkit for internet measurement

L Izhikevich, G Akiwate, B Berger… - Proceedings of the …, 2022 - dl.acm.org
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …

Ten years of zmap

Z Durumeric, D Adrian, P Stephens, E Wustrow… - Proceedings of the …, 2024 - dl.acm.org
Since ZMap's debut in 2013, networking and security researchers have used the open-
source scanner to write hundreds of research papers that study Internet behavior. In …

PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning

A Prasad, S Chandra - Computers & Security, 2024 - Elsevier
With the proliferation of the World Wide Web and the increasing sophistication of cyber
threats, phishing attacks have emerged as a significant concern for individuals and …

Forward pass: On the security implications of email forwarding mechanism and policy

E Liu, G Akiwate, M Jonker, A Mirian… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The critical role played by email has led to a range of extension protocols (eg, SPF, DKIM,
DMARC) designed to protect against the spoofing of email sender domains. These protocols …

Towards an empirical study to determine the effectiveness of support systems against e-mail phishing attacks

K Schiller, F Adamsky, Z Benenson - Extended Abstracts of the 2023 CHI …, 2023 - dl.acm.org
E-mail phishing attacks are still the number one gateway for attackers. Even when the patch
level of a network is up to date, if one employee clicks on a link in a phishing e-mail and …

Study on domain name system (dns) abuse: Technical report

J Bayer, Y Nosyk, O Hureau, S Fernandez… - arXiv preprint arXiv …, 2022 - arxiv.org
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …

[HTML][HTML] SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques

MF Veit, O Wiese, FL Ballreich, M Volkamer… - Computers & …, 2025 - Elsevier
User deception in emails is still one of the biggest security risks companies and end-users
face alike. Attackers try to mislead their victims when assessing whether emails are …

Early detection of spam domains with passive DNS and SPF

S Fernandez, M Korczyński, A Duda - International Conference on Passive …, 2022 - Springer
Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud
and malicious activities such as phishing campaigns or malware distribution. Spam domain …