Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{181073,
author = {Chewang Dukpa},
title = {A comprehensive study on Phishing Attacks: Evolution, Detection Models, and Prevention Techniques},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {1},
pages = {3170-3179},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=181073},
abstract = {Phishing remains a major concern in the field of cybersecurity, as it continues to deceive users through deceitful messages, websites, and emails. This paper offers a detailed study of phishing attacks, covering their history, methods, and the techniques used to recognize and stop them. The main aim is to understand how phishing has changed over time and to examine the effectiveness of different solutions used to prevent it. The paper discusses various approaches to identifying phishing, compares older methods and evaluates their strengths and weaknesses. A summary table is included to compare recent studies based on their focus and results. The discussion highlights the growing complexity of phishing tactics and the need for better protection methods. The paper concludes by outlining possible future developments, such as improved safety practices, better user training, and stronger security systems to reduce the risks caused by phishing.},
keywords = {},
month = {June},
}
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry