Article Preview
Top1. Introduction
Phishing is an illegal tool used to identify information about customers’ identity and financial institution passwords. Social engineering techniques employ spoofed e-mails from lawful companies and agencies. Those emails are designed to enable users to reveal financial data, including usernames and passwords on fake websites. Computer subterfuge programs place offenders on servers to deliberately access data by using devices that retrieve usernames or passwords from online accounts. Corrupt local browsers misdirect customers to fake websites (or legitimate Internet sites). They use pipe-controlled proxies to track and capture keystrokes by consumers(Al-Momani et al., 2011; Ammar Almomani et al., 2013; Ammar Almomani, Obeidat, Alsaedi, Obaida, & Al-Betar, 2015; Ammar Almomani, Wan, Altaher, et al., 2012; Ammar ALmomani, Wan, Manasrah, et al., 2012; A Almomani et al., 2013; B. B. Gupta, Arachchilage, & Psannis, 2018; B. B. Gupta, Tewari, Jain, & Agrawal, 2017)
Recently,phishing detection based on Semantic Link Network (SLN) and semantic features, semantically organizing web resources, identify a phishing web page and its phishing target, become most popular techniques in recent years(R. M. Mohammad & AbuMansour, 2017; Verma & Hossain, 2013; Wenyin, Fang, Quan, Qiu, & Liu, 2010).A significant number of our everyday activities (e.g. activities on social networks, online banking activities and electronic business activities) have been receiving much attention. That is attributed to the growth of world networking and communication technologies. The free, transparent and unrestricted internet infrastructure creates an attractive environment for cyber-attacks and critical network vulnerabilities, including seasoned software users. Although the user’s knowledge and expertise are significant, users cannot completely stop the phishing scam (Al-Nawasrah, Almomani, Atawneh, & Alauthman, 2020; Alauthman, Almomani, Alweshah, Omoush, & Alieyan, 2019; A Almomani, Alauthman, Omar, & Firas, 2017)
Attackers often take into account the personality characteristics of the end-user to increase the effectiveness of phishing attacks. They consider these characteristics to trick the users who are relatively experienced(Alauthman et al., 2019). It should be noted that end-user-specific cyber-attacks cause massive losses in sensitive information and cash for individuals. Such loss is represented in billions of dollars each year (Alauthman, Aslam, Al-Kasassbeh, Khan, Al-Qerem, Choo, et al., 2020).
The metaphor used in the term (phishing attacks) is derived from 'fishing, fishing’ for targets. Investigators have received a lot of attention in recent years.Carrying out phishing attacks is enticing and tempting for hackers, who open some fake websites that are built just like the common and legal websites on the internet. Although these sites have identical visual user interfaces, there is a need for URLs that are different from the URLs of the original page. A patient and a knowledgeable client can easily detect most of these malicious sites through browsing the URLs.