Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis

Authors

  • Vijayarani S Department of Computer Science, Bharathiar University, Coimbatore, India
  • Janani R Department of Computer Science, Bharathiar University, Coimbatore, India

DOI:

https://doi.org/10.26438/ijcse/v10i11.1619

Keywords:

Fraudulent Types, Spam, Scam, Phishing, Identity Thef, Spyware, Tools

Abstract

The evolution of the world economy has been very high with the proliferation of new technology and universal communication super highways. Nonetheless, one of the unintended consequences of online or the internet is its use for illegal activities. Increasing social crime has become a global problem, and the activity of international criminal organizations has been steeply increased. Online fraudulent usually denotes to any form of fraud mechanism that uses the internet's one or more components, such as emails, websites, web portals, etc. Nowadays, many tools are available to prevent the users from online fraudulent. The main aim of this paper to discuss the types of online fraud and tools to prevent those fraud activities.

References

[1] Hussein, Mohammed Juned, et al. "An evaluation of online proctoring tools." Open Praxis Vol.12, Issue.4, pp.509-525, 2020.

[2] Wang, Shun-Yung Kevin, and Wilson Huang. "The evolutional view of the types of identity thefts and online frauds in the era of the Internet." Internet Journal of Criminology, Vol.12, pp.1 -21, 2011.

[3] Koong, Kai S., Lai C. Liu, and June Wei. "An examination of Internet fraud occurrences." pp.441 – 449, 2012.

[4] Apte, Manoj, Girish Keshav Palshikar, and Sriram Baskaran. "Frauds in online social networks: A review." Social networks and surveillance for society, pp.1–18, 2019.

[5] Chen, Juan, and Chuanxiong Guo. "Online detection and prevention of phishing attacks." 2006 First International Conference on Communications and Networking in China. IEEE, pp.1-7, 2006.

[6] Lai, Albert M., and Jason Nieh. "On the performance of wide-area thin-client computing." ACM Transactions on Computer Systems (TOCS), Vol.24, Issue.2, pp.175-209, 2006.

[7] Alkhalil, Zainab, et al. "Phishing attacks: A recent comprehensive study and a new anatomy." Frontiers in Computer Science, Vol.3, pp.1-23, 2021.

[8] Varshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "A survey and classification of web phishing detection schemes." Security and Communication Networks, Vol.9, Issue.18, pp. 6266-6284, 2016.

[9] Srii Srinivasan, “A Merchant`s Guide to Online Fraud Detection”, 2022.

[10] El Aassal, Ayman, and Rakesh Verma. "Spears Against Shields: Are Defenders Winning the Phishing War?" Proceedings of the ACM International Workshop on Security and Privacy Analytics, pp.15 – 24, 2019.

[11] Ross, Philip E. "Microsoft to spammers: go phish [e-mail security]" IEEE Spectrum, Vol.43, Issue.1, pp.48-49, 2006.

[12] Sonowal, Gunikhan. "Phishing Kits." Phishing and Communication Channels. Apress, Berkeley, CA, pp.115-135, 2022.

[13] Martínez, Jeferson, and Javier M. Durán. "Software supply chain attacks, a threat to global cybersecurity: SolarWinds’ case study." International Journal of Safety and Security Engineering, Vol.11, Issue.5, pp.537-545, 2021.

[14] Sahoo Anmol, Sahoo Aradhana, Prasad Srinivas, “ Enterprise Security Management(E-SRM)”, Indian Journals.com, Vol.10, Issue.1, 2012.

[15] do Produto, Manual. "Norton™ AntiVirus.", 2013.

[16] Kline, Jeffrey S. "McAfee Associates, Inc. Competitive Strategies for the Computer AntiVirus Industry."

[17] Garba, Faisal A., et al. "Evaluating the state-of-the-art antivirus evasion tools on windows and android platform." 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf). IEEE, pp.1-4, 2019.

[18] Pavel, Cosmin. "Bitdefender®, the award-winning provider of innovative antivirus solutions." Romanian Distribution Committee Magazine 4.1: 20-24, 2013.

Downloads

Published

2022-11-30
CITATION
DOI: 10.26438/ijcse/v10i11.1619
Published: 2022-11-30

How to Cite

[1]
S. Vijayarani and R. Janani, “Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis”, Int. J. Comp. Sci. Eng., vol. 10, no. 11, pp. 16–19, Nov. 2022.