This research aims to describe and analyze phishing emails. The problem of phishing, types of message content of phishing emails, and the basic techniques of phishing email attacks are explained by way of introduction. The study also includes a review of the relevant literature on Web of Science and analyzes articles that deal with the threat of phishing attacks and defense against them. Data collected within a time interval of two months from two email accounts of one of the authors of the study was used for the analysis of 200 email messages. Data has been resented in tabular form, to allow further statistical processing using functions such as sum, average and frequency analysis. The core part of the study involved the classification and segmentation of emails according to the main goals of the sent message. The text analytical software Tovek, was used for the analysis, Contribution of the manuscript is in the understanding of phishing emails and extending the knowledge base in education and training in phishing email defense. The discussion compares the results of this research with those of the studies mentioned in the "Introduction" and "Literature review" sections. Furthermore, the emerging problems and limitations of the use of text analytical software are described, and finally the issue is devoted to problems with obtaining personal data from recipients' emails. The "Conclusion" section summarizes the contributions of this research.
Citation: Ladislav Burita, Petr Matoulek, Kamil Halouzka, Pavel Kozak. Analysis of phishing emails[J]. AIMS Electronics and Electrical Engineering, 2021, 5(1): 93-116. doi: 10.3934/electreng.2021006
[1] | Boris P. Andreianov, Carlotta Donadello, Ulrich Razafison, Julien Y. Rolland, Massimiliano D. Rosini . Solutions of the Aw-Rascle-Zhang system with point constraints. Networks and Heterogeneous Media, 2016, 11(1): 29-47. doi: 10.3934/nhm.2016.11.29 |
[2] | Shimao Fan, Michael Herty, Benjamin Seibold . Comparative model accuracy of a data-fitted generalized Aw-Rascle-Zhang model. Networks and Heterogeneous Media, 2014, 9(2): 239-268. doi: 10.3934/nhm.2014.9.239 |
[3] | Benjamin Seibold, Morris R. Flynn, Aslan R. Kasimov, Rodolfo R. Rosales . Constructing set-valued fundamental diagrams from Jamiton solutions in second order traffic models. Networks and Heterogeneous Media, 2013, 8(3): 745-772. doi: 10.3934/nhm.2013.8.745 |
[4] | Michael Burger, Simone Göttlich, Thomas Jung . Derivation of second order traffic flow models with time delays. Networks and Heterogeneous Media, 2019, 14(2): 265-288. doi: 10.3934/nhm.2019011 |
[5] | Mauro Garavello . A review of conservation laws on networks. Networks and Heterogeneous Media, 2010, 5(3): 565-581. doi: 10.3934/nhm.2010.5.565 |
[6] | Bertrand Haut, Georges Bastin . A second order model of road junctions in fluid models of traffic networks. Networks and Heterogeneous Media, 2007, 2(2): 227-253. doi: 10.3934/nhm.2007.2.227 |
[7] | Michael Herty, S. Moutari, M. Rascle . Optimization criteria for modelling intersections of vehicular traffic flow. Networks and Heterogeneous Media, 2006, 1(2): 275-294. doi: 10.3934/nhm.2006.1.275 |
[8] | Michael Herty, Lorenzo Pareschi, Mohammed Seaïd . Enskog-like discrete velocity models for vehicular traffic flow. Networks and Heterogeneous Media, 2007, 2(3): 481-496. doi: 10.3934/nhm.2007.2.481 |
[9] | Cécile Appert-Rolland, Pierre Degond, Sébastien Motsch . Two-way multi-lane traffic model for pedestrians in corridors. Networks and Heterogeneous Media, 2011, 6(3): 351-381. doi: 10.3934/nhm.2011.6.351 |
[10] | Oliver Kolb, Simone Göttlich, Paola Goatin . Capacity drop and traffic control for a second order traffic model. Networks and Heterogeneous Media, 2017, 12(4): 663-681. doi: 10.3934/nhm.2017027 |
This research aims to describe and analyze phishing emails. The problem of phishing, types of message content of phishing emails, and the basic techniques of phishing email attacks are explained by way of introduction. The study also includes a review of the relevant literature on Web of Science and analyzes articles that deal with the threat of phishing attacks and defense against them. Data collected within a time interval of two months from two email accounts of one of the authors of the study was used for the analysis of 200 email messages. Data has been resented in tabular form, to allow further statistical processing using functions such as sum, average and frequency analysis. The core part of the study involved the classification and segmentation of emails according to the main goals of the sent message. The text analytical software Tovek, was used for the analysis, Contribution of the manuscript is in the understanding of phishing emails and extending the knowledge base in education and training in phishing email defense. The discussion compares the results of this research with those of the studies mentioned in the "Introduction" and "Literature review" sections. Furthermore, the emerging problems and limitations of the use of text analytical software are described, and finally the issue is devoted to problems with obtaining personal data from recipients' emails. The "Conclusion" section summarizes the contributions of this research.
[1] | Hong J (2012) The state of phishing attacks. Communications of the ACM 55: 74-81. |
[2] | Singer PW, Friedman A (2014) Cybersecurity: What Everyone Needs to Know. 1st Eds, Oxford University Press. |
[3] | Krombholz K, Hobel H, Huber M, et al. (2015) Advanced social engineering attacks. J Inf Secur Appl 22: 113-122. |
[4] | Ducklin P (2020) Phishingové triky aneb 10 nejběžnějších podvodů roku 2020 (Phishing tricks or the 10 most common scams of 2020). IT SYSTEMS. Available from: https://www.systemonline.cz/it-security/phishingove-triky.htm |
[5] | Becton L (2020) The Importance of Digital Literacy in K-12, Available from: https://www.educationcorner.com/importance-digital-literacy-k-12.html |
[6] |
Parsons K, Butavicius M, Delfabbro P, et al. (2019) Predicting susceptibility to social influence in phishing emails. Int J Hum-Comput St 128: 17-26. doi: 10.1016/j.ijhcs.2019.02.007
![]() |
[7] | Lin T, Capecci DE, Ellis DM, et al. (2019) Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. ACM T Comput-Hum Int 26: 1-28. |
[8] |
Adewumi OA, Akinyelu AA (2016) A hybrid firefly and support vector machine classifier for phishing email detection. Kybernetes 45: 977-994. doi: 10.1108/K-07-2014-0129
![]() |
[9] |
Sami S, Nauman A, Li Z (2018) Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis Support Syst 107: 88-102. doi: 10.1016/j.dss.2018.01.001
![]() |
[10] | Zhao M, An B, Kiekintveld C (2016) Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks. In: Proceedings of 30th Association-for-the-Advancement-of-Artificial-Intelligence (AAAI) Conference on Artificial Intelligence 30: 658-664. |
[11] | Wang J, Li Y, Rao HR (2016) Overconfidence in Phishing Email Detection. J Assoc Inf Syst 17: 759-783. |
[12] |
Williams EJ, Polage D (2019) How persuasive is phishing email? The role of authentic design, influence and current events in email judgements. Behav Inform Technol 38: 184-197. doi: 10.1080/0144929X.2018.1519599
![]() |
[13] |
Ferreira A, Teles S (2019) Persuasion: How phishing emails can influence users and bypass security measures. Int J Hum-Comput St 125: 19-31. doi: 10.1016/j.ijhcs.2018.12.004
![]() |
[14] |
Seifollahi S, Bagirov A, Layton R, et al. (2017) Optimization Based Clustering Algorithms for Authorship Analysis of Phishing Emails. Neural Process Lett 46: 411-425. doi: 10.1007/s11063-017-9593-7
![]() |
[15] |
Canfield CI, Fischhoff B, Davis A (2019) Better beware: comparing metacognition for phishing and legitimate emails. Metacognition and Learning 14: 343-362. doi: 10.1007/s11409-019-09197-5
![]() |
[16] | Nowak J, Korytkowski M, Wozniak M, et al. (2019) URL-based Phishing Attack Detection by Convolutional Neural Networks. Aust J Intell Inf Process Syst 15: 60-67. |
[17] |
Wei W, Ke Q, Nowak J, et al. (2020) Accurate and fast URL phishing detector: A convolutional neural network approach. Comput Netw 178: 107275. doi: 10.1016/j.comnet.2020.107275
![]() |
[18] | The text analytical software TOVEK, 2020. Available from: https://www.tovek.cz. |
[19] | Tobac R (2020) Social Engineer & Ethical Hacker. Live Hacking Demo: Hacking the Human, Sophos Evolve - Cybersecurity Summit, Webinar presentation. |
[20] | DZRO FVT-2, KYBERSILY. Project of faculty research: Cyber forces and resources. University of Defence, Faculty of Military Technologies, Brno, Czech Republic, 2021. |
1. | Mohamed Benyahia, Massimiliano D. Rosini, A macroscopic traffic model with phase transitions and local point constraints on the flow, 2017, 12, 1556-181X, 297, 10.3934/nhm.2017013 | |
2. | Mohamed Benyahia, Massimiliano D. Rosini, Lack of BV bounds for approximate solutions to a two‐phase transition model arising from vehicular traffic, 2020, 43, 0170-4214, 10381, 10.1002/mma.6304 | |
3. | Mohamed Benyahia, Massimiliano D. Rosini, Entropy solutions for a traffic model with phase transitions, 2016, 141, 0362546X, 167, 10.1016/j.na.2016.04.011 | |
4. | Marco Di Francesco, Simone Fagioli, Massimiliano D. Rosini, Giovanni Russo, 2018, Chapter 37, 978-3-319-91544-9, 487, 10.1007/978-3-319-91545-6_37 | |
5. | Shuai Fan, Yu Zhang, Riemann problem and wave interactions for an inhomogeneous Aw-Rascle traffic flow model with extended Chaplygin gas, 2023, 152, 00207462, 104384, 10.1016/j.ijnonlinmec.2023.104384 | |
6. | Boris Andreianov, Carlotta Donadello, Ulrich Razafison, Massimiliano D. Rosini, Analysis and approximation of one-dimensional scalar conservation laws with general point constraints on the flux, 2018, 116, 00217824, 309, 10.1016/j.matpur.2018.01.005 | |
7. | Marco Di Francesco, Simone Fagioli, Massimiliano D. Rosini, Many particle approximation of the Aw-Rascle-Zhang second order model for vehicular traffic, 2017, 14, 1551-0018, 127, 10.3934/mbe.2017009 | |
8. | M. Di Francesco, S. Fagioli, M. D. Rosini, G. Russo, 2017, Chapter 9, 978-3-319-49994-9, 333, 10.1007/978-3-319-49996-3_9 | |
9. | Mohamed Benyahia, Carlotta Donadello, Nikodem Dymski, Massimiliano D. Rosini, An existence result for a constrained two-phase transition model with metastable phase for vehicular traffic, 2018, 25, 1021-9722, 10.1007/s00030-018-0539-1 | |
10. | Boris Andreianov, Carlotta Donadello, Ulrich Razafison, Massimiliano Daniele Rosini, 2018, Chapter 5, 978-3-030-05128-0, 103, 10.1007/978-3-030-05129-7_5 | |
11. | E. Dal Santo, M. D. Rosini, N. Dymski, M. Benyahia, General phase transition models for vehicular traffic with point constraints on the flow, 2017, 40, 01704214, 6623, 10.1002/mma.4478 | |
12. | Stefano Villa, Paola Goatin, Christophe Chalons, Moving bottlenecks for the Aw-Rascle-Zhang traffic flow model, 2017, 22, 1553-524X, 3921, 10.3934/dcdsb.2017202 | |
13. | Muhammed Ali Mehmood, Hard congestion limit of the dissipative Aw-Rascle system with a polynomial offset function, 2024, 533, 0022247X, 128028, 10.1016/j.jmaa.2023.128028 | |
14. | Wenjie Zhu, Rongyong Zhao, Hao Zhang, Cuiling Li, Ping Jia, Yunlong Ma, Dong Wang, Miyuan Li, Panic-Pressure Conversion Model From Microscopic Pedestrian Movement to Macroscopic Crowd Flow, 2023, 18, 1555-1415, 10.1115/1.4063505 | |
15. | Cecile Appert-Rolland, Alethea B.T. Barbaro, 2025, 25430009, 10.1016/bs.atpp.2025.04.004 | |
16. | Nicola De Nitti, Denis Serre, Enrique Zuazua, Pointwise constraints for scalar conservation laws with positive wave velocity, 2025, 76, 0044-2275, 10.1007/s00033-025-02459-0 |