Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies

Main Article Content

Kutub Thakur, Juan Shan
Al-Sakib Khan Pathan


Now-a-days, social engineering is considered to be one of the most overwhelming threats in the field of cyber security. Social engineers, who deceive people by using their personal appeal through cunning communication, do not rely on finding the vulnerabilities to break into the cyberspace as traditional hackers. Instead, they make shifty communication with the victims that often enable them to gain confidential information like their credentials to compromise cyber security. Phishing attack has become one of the most commonly used social engineering methods in daily life. Since the attacker does not rely on technical vulnerabilities, social engineering, especially phishing attacks cannot be tackled using cyber security tools like firewalls, IDSs (Intrusion Detection Systems), etc. What is more, the increased popularity of the social media has further complicated the problem by availing abundance of information that can be used against the victims. The objective of this paper is to propose a new framework that characterizes the behavior of the phishing attack, and a comprehensive model for describing awareness, measurement and defense of phishing based attacks. To be specific, we propose a hybrid multi-layer model using Natural Language Processing (NLP) techniques for defending against phishing attacks. The model enables a new prospect in detection of a potential attacker trying to manipulate the victim for revealing confidential information.

Article Details

How to Cite
Juan Shan, K. T., & Pathan, A.-S. K. (2022). Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. International Journal of Communication Networks and Information Security (IJCNIS), 10(1). (Original work published April 14, 2018)
Research Articles
Author Biography

Al-Sakib Khan Pathan, Southeast University, Bangladesh

Al-Sakib Khan Pathan received Ph.D. degree (MS leading to Ph.D.) in Computer Engineering in 2009 from Kyung Hee University, South Korea. He received B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. He is currently a part-time faculty at Southeast University, Bangladesh. From August 2010 to July 2015, he served as an Assistant Professor at Computer Science department at IIUM, Malaysia. Even before that, till June 2010, he was an Assistant Professor at Computer Science and Engineering department, BRAC University, Bangladesh and also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009. His research interests include wireless sensor networks, network security, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has many publications in these areas. He has served as a Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences/workshops like GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, etc. He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in IEEE GreenCom’13 conference. He is currently serving on various editorial positions like Editor-in-Chief of International Journal of Communication Networks and Information Security, Deputy Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers, Associate Editor of International Journal of Computational Science and Engineering, Inderscience, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 15 published books. One of his books has been included twice in Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, 2 other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT three times, in 2012, 2014, and 2015; Outstanding Reviewer of Elsevier Computer Networks (July 2015) and Elsevier JNCA (November 2015); recognized reviewer status of Elsevier Computers & Electrical Engineering (March 2014), Elsevier Ad Hoc Networks journal (April 2014), Elsevier FGCS (October 2014), just to mention a few.  As part of his academic duties, he has so far supervised 2 PhD students to completion. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA and several IEEE technical committees.