Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing websites bear a striking resemblance to their legi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2023-01, Vol.11, p.1-1
Hauptverfasser: Li, Wenhao, Manickam, Selvakumar, Laghari, Shams Ul Arfeen, Chong, Yung-Wey
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 11
creator Li, Wenhao
Manickam, Selvakumar
Laghari, Shams Ul Arfeen
Chong, Yung-Wey
description Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing websites bear a striking resemblance to their legitimate counterparts, thus rendering them inconspicuous and challenging for an unsuspecting user to identify. Criminals and phishing experts frequently leverage cloaking mechanisms to evade detection software and web crawlers. This paper provides a comprehensive systematic review of primary studies conducted between 2012 and 2022 on using cloaking techniques to evade detection by anti-phishing entities based on data extracted from Scopus, Web of Science, and Google Scholar. Different server-side and client-side detection strategies, phishing techniques and cloaking mechanisms, toolkits, blacklists, phishing or anti-phishing ecosystems, and other such concepts have been taken as thematic outputs of the study and have been discussed in detail. This systematic literature review (SLR) is one of the first reviews to be conducted for analyzing the current cloaking or evasion techniques used by phishers, and the limitations of the study have been outlined as well.
doi_str_mv 10.1109/ACCESS.2023.3293063
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2023_3293063</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10175532</ieee_id><doaj_id>oai_doaj_org_article_84042c4ae23d421fae93eafe7b414d1c</doaj_id><sourcerecordid>2840389667</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-1730058ccce8509876884adcb118205e15d2eda3bb25d8a0f7e037661f2223063</originalsourceid><addsrcrecordid>eNpNUU1Lw0AQDaJgqf0Feljw3Lof2WTjrYSqhYJiW8TTstlMmq1ttu6mlf57E1Okc5nhMe_NPF4Q3BI8IgQnD-M0ncznI4opGzGaMByxi6BHSZQMGWfR5dl8HQy8X-OmRAPxuBd8LittD-BMtUJ1CSjdWPX1iMZofvQ1bFVtNHqHg4EfZAu0AF1W5nsPHi095Ki2KLWVBrVBb6XxZavyAZk3Nfib4KpQGw-DU-8Hy6fJIn0Zzl6fp-l4NtSMJ_WQxAxjLrTWIDhORBwJEapcZ4QIijkQnlPIFcsyynOhcBEDZnEUkYJS2nrtB9NON7dqLXfObJU7SquM_AOsW0nlGhsbkCLEIdWhAsrykJJCQcJAFRBnIQlzohut-05r52zrspZru3dV876kDZmJJIriZot1W9pZ7x0U_1cJlm0ksotEtpHIUyQN665jGQA4Y5CYc0bZL9xJhio</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2840389667</pqid></control><display><type>article</type><title>Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites</title><source>Directory of Open Access Journals</source><source>IEEE Xplore Open Access Journals</source><source>EZB Electronic Journals Library</source><creator>Li, Wenhao ; Manickam, Selvakumar ; Laghari, Shams Ul Arfeen ; Chong, Yung-Wey</creator><creatorcontrib>Li, Wenhao ; Manickam, Selvakumar ; Laghari, Shams Ul Arfeen ; Chong, Yung-Wey</creatorcontrib><description>Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing websites bear a striking resemblance to their legitimate counterparts, thus rendering them inconspicuous and challenging for an unsuspecting user to identify. Criminals and phishing experts frequently leverage cloaking mechanisms to evade detection software and web crawlers. This paper provides a comprehensive systematic review of primary studies conducted between 2012 and 2022 on using cloaking techniques to evade detection by anti-phishing entities based on data extracted from Scopus, Web of Science, and Google Scholar. Different server-side and client-side detection strategies, phishing techniques and cloaking mechanisms, toolkits, blacklists, phishing or anti-phishing ecosystems, and other such concepts have been taken as thematic outputs of the study and have been discussed in detail. This systematic literature review (SLR) is one of the first reviews to be conducted for analyzing the current cloaking or evasion techniques used by phishers, and the limitations of the study have been outlined as well.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3293063</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Anti-Phishing Ecosystem ; Blocklists ; Cloaking Techniques ; Companies ; Cybersecurity ; Ecosystems ; Evasion Techniques ; History ; Literature reviews ; Passwords ; Phishing ; Phishing Blacklist ; Phishing Toolkit ; Systematic review ; Websites</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c359t-1730058ccce8509876884adcb118205e15d2eda3bb25d8a0f7e037661f2223063</cites><orcidid>0000-0003-1750-7441 ; 0000-0003-4378-1954 ; 0000-0002-6036-395X ; 0009-0007-4342-6676</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10175532$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,27610,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Li, Wenhao</creatorcontrib><creatorcontrib>Manickam, Selvakumar</creatorcontrib><creatorcontrib>Laghari, Shams Ul Arfeen</creatorcontrib><creatorcontrib>Chong, Yung-Wey</creatorcontrib><title>Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites</title><title>IEEE access</title><addtitle>Access</addtitle><description>Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing websites bear a striking resemblance to their legitimate counterparts, thus rendering them inconspicuous and challenging for an unsuspecting user to identify. Criminals and phishing experts frequently leverage cloaking mechanisms to evade detection software and web crawlers. This paper provides a comprehensive systematic review of primary studies conducted between 2012 and 2022 on using cloaking techniques to evade detection by anti-phishing entities based on data extracted from Scopus, Web of Science, and Google Scholar. Different server-side and client-side detection strategies, phishing techniques and cloaking mechanisms, toolkits, blacklists, phishing or anti-phishing ecosystems, and other such concepts have been taken as thematic outputs of the study and have been discussed in detail. This systematic literature review (SLR) is one of the first reviews to be conducted for analyzing the current cloaking or evasion techniques used by phishers, and the limitations of the study have been outlined as well.</description><subject>Anti-Phishing Ecosystem</subject><subject>Blocklists</subject><subject>Cloaking Techniques</subject><subject>Companies</subject><subject>Cybersecurity</subject><subject>Ecosystems</subject><subject>Evasion Techniques</subject><subject>History</subject><subject>Literature reviews</subject><subject>Passwords</subject><subject>Phishing</subject><subject>Phishing Blacklist</subject><subject>Phishing Toolkit</subject><subject>Systematic review</subject><subject>Websites</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1Lw0AQDaJgqf0Feljw3Lof2WTjrYSqhYJiW8TTstlMmq1ttu6mlf57E1Okc5nhMe_NPF4Q3BI8IgQnD-M0ncznI4opGzGaMByxi6BHSZQMGWfR5dl8HQy8X-OmRAPxuBd8LittD-BMtUJ1CSjdWPX1iMZofvQ1bFVtNHqHg4EfZAu0AF1W5nsPHi095Ki2KLWVBrVBb6XxZavyAZk3Nfib4KpQGw-DU-8Hy6fJIn0Zzl6fp-l4NtSMJ_WQxAxjLrTWIDhORBwJEapcZ4QIijkQnlPIFcsyynOhcBEDZnEUkYJS2nrtB9NON7dqLXfObJU7SquM_AOsW0nlGhsbkCLEIdWhAsrykJJCQcJAFRBnIQlzohut-05r52zrspZru3dV876kDZmJJIriZot1W9pZ7x0U_1cJlm0ksotEtpHIUyQN665jGQA4Y5CYc0bZL9xJhio</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Li, Wenhao</creator><creator>Manickam, Selvakumar</creator><creator>Laghari, Shams Ul Arfeen</creator><creator>Chong, Yung-Wey</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1750-7441</orcidid><orcidid>https://orcid.org/0000-0003-4378-1954</orcidid><orcidid>https://orcid.org/0000-0002-6036-395X</orcidid><orcidid>https://orcid.org/0009-0007-4342-6676</orcidid></search><sort><creationdate>20230101</creationdate><title>Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites</title><author>Li, Wenhao ; Manickam, Selvakumar ; Laghari, Shams Ul Arfeen ; Chong, Yung-Wey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-1730058ccce8509876884adcb118205e15d2eda3bb25d8a0f7e037661f2223063</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Anti-Phishing Ecosystem</topic><topic>Blocklists</topic><topic>Cloaking Techniques</topic><topic>Companies</topic><topic>Cybersecurity</topic><topic>Ecosystems</topic><topic>Evasion Techniques</topic><topic>History</topic><topic>Literature reviews</topic><topic>Passwords</topic><topic>Phishing</topic><topic>Phishing Blacklist</topic><topic>Phishing Toolkit</topic><topic>Systematic review</topic><topic>Websites</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Wenhao</creatorcontrib><creatorcontrib>Manickam, Selvakumar</creatorcontrib><creatorcontrib>Laghari, Shams Ul Arfeen</creatorcontrib><creatorcontrib>Chong, Yung-Wey</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Wenhao</au><au>Manickam, Selvakumar</au><au>Laghari, Shams Ul Arfeen</au><au>Chong, Yung-Wey</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information. Phishing websites bear a striking resemblance to their legitimate counterparts, thus rendering them inconspicuous and challenging for an unsuspecting user to identify. Criminals and phishing experts frequently leverage cloaking mechanisms to evade detection software and web crawlers. This paper provides a comprehensive systematic review of primary studies conducted between 2012 and 2022 on using cloaking techniques to evade detection by anti-phishing entities based on data extracted from Scopus, Web of Science, and Google Scholar. Different server-side and client-side detection strategies, phishing techniques and cloaking mechanisms, toolkits, blacklists, phishing or anti-phishing ecosystems, and other such concepts have been taken as thematic outputs of the study and have been discussed in detail. This systematic literature review (SLR) is one of the first reviews to be conducted for analyzing the current cloaking or evasion techniques used by phishers, and the limitations of the study have been outlined as well.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3293063</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-1750-7441</orcidid><orcidid>https://orcid.org/0000-0003-4378-1954</orcidid><orcidid>https://orcid.org/0000-0002-6036-395X</orcidid><orcidid>https://orcid.org/0009-0007-4342-6676</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023-01, Vol.11, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2023_3293063
source Directory of Open Access Journals; IEEE Xplore Open Access Journals; EZB Electronic Journals Library
subjects Anti-Phishing Ecosystem
Blocklists
Cloaking Techniques
Companies
Cybersecurity
Ecosystems
Evasion Techniques
History
Literature reviews
Passwords
Phishing
Phishing Blacklist
Phishing Toolkit
Systematic review
Websites
title Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T17%3A55%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Uncovering%20the%20Cloak:%20A%20Systematic%20Review%20of%20Techniques%20Used%20to%20Conceal%20Phishing%20Websites&rft.jtitle=IEEE%20access&rft.au=Li,%20Wenhao&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3293063&rft_dat=%3Cproquest_cross%3E2840389667%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2840389667&rft_id=info:pmid/&rft_ieee_id=10175532&rft_doaj_id=oai_doaj_org_article_84042c4ae23d421fae93eafe7b414d1c&rfr_iscdi=true