Novel Defence Scheme for Phishing Attacks in Mobile Phones

被引:2
|
作者
Johny, C. Nivya [1 ]
Ratheesh, T. K. [1 ]
机构
[1] Govt Engn Coll, Dept Informat Technol Idukki, Idukki, Kerala, India
关键词
Website phishing detection; Application phishing detection;
D O I
10.1007/978-3-030-03146-6_136
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the day to day life we might have encountered the problem of redirecting to the unwanted page after entering the user credentials which are exactly the phishing attacks. Here the attacker will masquerade as true identity. Phishing attack are gaining importance in mobile phones as attacks on them are not well addressed and mitigated. The main reason behind this is the user preferences and habits like hesitation to use virtual keyboard, tendency to follow the hyperlinks, careless installations of applications etc. Here we propose a new scheme to address these issues and to detect phishing attacks in mobile phones. The proposed scheme operates on two dimensions based on how the attacks happens in a mobile phone viz. Website based phishing detection which detects attacks occur through websites and Application based phishing detection to detect attacks occur through the installed applications on the mobile phones. The performance evaluation showed that the proposed architecture gives 92% accuracy for websites based phishing attack detection and 90% accuracy for application based phishing attack detection.
引用
收藏
页码:1174 / 1181
页数:8
相关论文
共 50 条
  • [21] Solution prevents phishing attacks
    不详
    R&D MAGAZINE, 2004, 46 (10): : 17 - 17
  • [22] Phishing Attacks Modifications and Evolutions
    Cui, Qian
    Jourdan, Guy-Vincent
    Bochmann, Gregor V.
    Onut, Iosif-Viorel
    Flood, Jason
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 243 - 262
  • [23] Cognitive Triaging of Phishing Attacks
    van der Heijden, Amber
    Allodi, Luca
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1309 - 1326
  • [24] Analysis of phishing attacks and countermeasures
    Issac, Biju
    Chiong, Raymond
    Jacob, Seibu Mary
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
  • [25] Phishing Attacks Root Causes
    Abroshan, Hossein
    Devos, Jan
    Poels, Geert
    Laermans, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 187 - 202
  • [26] AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 595 - 607
  • [27] Mitigating Phishing Attacks: An Overview
    Sumner, Alex
    Yuan, Xiaohong
    PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 72 - 77
  • [28] AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 365 - 380
  • [29] PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
    Castano, Felipe
    Fernandez, Eduardo Fidalgo
    Alaiz-Rodriguez, Rocio
    Alegre, Enrique
    IEEE ACCESS, 2023, 11 : 40779 - 40789
  • [30] IP-Based Connection Between Mobile Phones A Novel Connection System Of Mobile Phones In A Wireless Network
    Patel, Jeel J.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,