An Overview: Phishing Attack Detection and Mitigation Strategies
- DOI
- 10.2991/978-94-6239-654-8_52How to use a DOI?
- Keywords
- Phishing; Cybersecurity; Cyber Threats; AntiPhishing Techniques; Social media security; machine learning; Deep learning
- Abstract
Internet has also become very common and this has changed the daily lives of people because now people can easily shop online, communicate through the internet and access other government functions. This growth has also been accompanied by the fact that there is so much sensitive data being exchanged over the internet, and cybercriminals have taken advantage of this situation to carry out phishing in order to capitalize on such an opportunity. Such practice as phishing has also been among the most persistent cyber threats as any attacker constantly changes their methods, making malicious websites more plausible and simpler to implement. With the development of such tactics, it is becoming harder to detect and prevent phishing. This paper contains a comprehensive overview of various techniques of phishing attacks and how they are directed toward the online users. It also looks at the key security initiatives that have been created to combat such threats, their strength, and their weakness. It is on this knowledge that the study postulates better protection strategies aimed at strengthening the stability, dependability, and general security of anti-phishing systems.
- Copyright
- © 2026 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - R. Padma Devi AU - V. Khanaa PY - 2026 DA - 2026/04/24 TI - An Overview: Phishing Attack Detection and Mitigation Strategies BT - Proceedings of the Global Conference on Sustainable Energy Systems, Smart Electronics and Intelligent Computing (GCSESEIC 2025) PB - Atlantis Press SP - 652 EP - 665 SN - 2352-5401 UR - https://doi.org/10.2991/978-94-6239-654-8_52 DO - 10.2991/978-94-6239-654-8_52 ID - Devi2026 ER -