Proceedings of the Global Conference on Sustainable Energy Systems, Smart Electronics and Intelligent Computing (GCSESEIC 2025)

An Overview: Phishing Attack Detection and Mitigation Strategies

Authors
R. Padma Devi1, *, V. Khanaa1
1Department of Computer Science and Engineering, Bharath institute of higher education and research, Chennai, Tamilnadu, India
*Corresponding author. Email: rpadmadevi@gmail.com
Corresponding Author
R. Padma Devi
Available Online 24 April 2026.
DOI
10.2991/978-94-6239-654-8_52How to use a DOI?
Keywords
Phishing; Cybersecurity; Cyber Threats; AntiPhishing Techniques; Social media security; machine learning; Deep learning
Abstract

Internet has also become very common and this has changed the daily lives of people because now people can easily shop online, communicate through the internet and access other government functions. This growth has also been accompanied by the fact that there is so much sensitive data being exchanged over the internet, and cybercriminals have taken advantage of this situation to carry out phishing in order to capitalize on such an opportunity. Such practice as phishing has also been among the most persistent cyber threats as any attacker constantly changes their methods, making malicious websites more plausible and simpler to implement. With the development of such tactics, it is becoming harder to detect and prevent phishing. This paper contains a comprehensive overview of various techniques of phishing attacks and how they are directed toward the online users. It also looks at the key security initiatives that have been created to combat such threats, their strength, and their weakness. It is on this knowledge that the study postulates better protection strategies aimed at strengthening the stability, dependability, and general security of anti-phishing systems.

Copyright
© 2026 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the Global Conference on Sustainable Energy Systems, Smart Electronics and Intelligent Computing (GCSESEIC 2025)
Series
Advances in Engineering Research
Publication Date
24 April 2026
ISBN
978-94-6239-654-8
ISSN
2352-5401
DOI
10.2991/978-94-6239-654-8_52How to use a DOI?
Copyright
© 2026 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - R. Padma Devi
AU  - V. Khanaa
PY  - 2026
DA  - 2026/04/24
TI  - An Overview: Phishing Attack Detection and Mitigation Strategies
BT  - Proceedings of the Global Conference on Sustainable Energy Systems, Smart Electronics and Intelligent Computing (GCSESEIC 2025)
PB  - Atlantis Press
SP  - 652
EP  - 665
SN  - 2352-5401
UR  - https://doi.org/10.2991/978-94-6239-654-8_52
DO  - 10.2991/978-94-6239-654-8_52
ID  - Devi2026
ER  -