Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Social Phishing

  • Yada ZhuEmail author
  • Jingrui He
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_290-1




Efforts taken from multiple perspectives to combat phishing crimes.

Email spam

Unsolicited emails for the purpose of advertisement or committing fraud.

Machine learning

The design and development of algorithms that takes as input empirical data, and outputs patterns and predictions for future data.


Fraudsters who commit phishing crimes.


Electronic fraud based on social engineering.

Phishing site

Web sites created by phishers to steal sensitive information from users.


Nowadays, phishing has gradually become a popular type of electronic fraud that makes use of social engineering to steal sensitive information from users such as user name, password, bank account number, credit card details, etc. (https://kb.iu.edu/d/arsf, http://en.wikipedia.org/wiki/Phishing#Early_phishing_on_AOL). Phishing can be carried out via emails, instant messages, phone calls, text...

This is a preview of subscription content, log in to check access.


  1. Abu-nimeh S, Nappa D, Wang X, Nair S (2008) A distributed architecture for phishing detection using Bayesian additive regression trees. In: eCrime Researchers Summit. Atalanta, GeorgiaGoogle Scholar
  2. Chandrasekaran M, Narayanan K, Upadhyaya S (2006) Phishing email detection based on structural properties. In: Proceedings of the NYS cyber security conference. Albany, NYGoogle Scholar
  3. eBay (2007) eBay tool bar. http://anywhere.ebay.com/browser/firefox/
  4. Egelman S, Cranor LF, Hong J (2008) You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings, CHI, FlorenceGoogle Scholar
  5. Field J (2017) MailScanner. http://www.mailscanner.info
  6. Herley C, Florencio D (2008) A profitless endeavor: phishing as tragedy of the commons. In NSPW’08: Proceedings of the 2008 workshop on new security paradigmsGoogle Scholar
  7. ClamAV (2016) http://www.clamav.net
  8. Jagatic T, Johnson N, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRefGoogle Scholar
  9. Jonathan BP (1982) Simple mail transfer protocol. RFC821. https://tools.ietf.org/html/rfc821
  10. Kirda E, Kruegel C (2006) Protecting users against phishing attacks. Comput J.  https://doi.org/10.1093/comjnl/bxh169
  11. Ludl C, McAllister S, Kirda E, Kruegel C (2007) On the effectiveness of techniques to detect phishing sites. In: DIMVA ’07: Proceedings of the 4th international conference on detection of intrusions and Malware, and vulnerability assessment. Springer, Berlin/Heidelberg, pp 20–39Google Scholar
  12. NetCraft (2007) Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/
  13. Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: SIGCOMM ’06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. ACM, New York, pp 291–302Google Scholar
  14. Schneider F, Provos N, Moll R, Chew M, Rakowski B (2007) Phishing protection design documentation. https://wiki.mozilla.org/Phishing_Protection:_Design_ Documentation
  15. Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009: sixth conference on email and anti-spam, July 2009Google Scholar
  16. Sun B, Wen Q, Liang X (2010) A DNS based anti-phishing approach. In: Second international conference on networks security. Wireless Communications and Trusted Computing, BeijingGoogle Scholar
  17. Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages. In: NDSS’10. San Diego, CaliforniaGoogle Scholar
  18. Wilson C, Argles D (2011) The fight against phishing: technology, the end user and legislation. In: The international conference on information society (i-Society), LondonGoogle Scholar
  19. Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, MontrealGoogle Scholar
  20. Zhang J, Wu C Guan H, Wang Q, Zhang L, Ou Y, Xin Y, Chen L (2011) An content-analysis based large scale anti-phishing gateway. In: 12th IEEE international conference on communication technology, NanjingGoogle Scholar

Copyright information

© Springer Science+Business Media LLC 2018

Authors and Affiliations

  1. 1.IBM ResearchYorktown HeightsUSA
  2. 2.Computer Science and EngineeringArizona State UniversityTempeUSA

Section editors and affiliations

  • Rosa M. Benito
    • 1
  • Juan Carlos Losada
    • 2
  1. 1.Universidad Politécnica de MadridMadridSpain
  2. 2.Universidad Politécnica de MadridMadridSpain