Novel Defence Scheme for Phishing Attacks in Mobile Phones

被引:2
|
作者
Johny, C. Nivya [1 ]
Ratheesh, T. K. [1 ]
机构
[1] Govt Engn Coll, Dept Informat Technol Idukki, Idukki, Kerala, India
关键词
Website phishing detection; Application phishing detection;
D O I
10.1007/978-3-030-03146-6_136
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the day to day life we might have encountered the problem of redirecting to the unwanted page after entering the user credentials which are exactly the phishing attacks. Here the attacker will masquerade as true identity. Phishing attack are gaining importance in mobile phones as attacks on them are not well addressed and mitigated. The main reason behind this is the user preferences and habits like hesitation to use virtual keyboard, tendency to follow the hyperlinks, careless installations of applications etc. Here we propose a new scheme to address these issues and to detect phishing attacks in mobile phones. The proposed scheme operates on two dimensions based on how the attacks happens in a mobile phone viz. Website based phishing detection which detects attacks occur through websites and Application based phishing detection to detect attacks occur through the installed applications on the mobile phones. The performance evaluation showed that the proposed architecture gives 92% accuracy for websites based phishing attack detection and 90% accuracy for application based phishing attack detection.
引用
收藏
页码:1174 / 1181
页数:8
相关论文
共 50 条
  • [31] A Novel Antenna with a Small Nonground Area for Mobile Phones
    Liu, Ying
    Luo, Yi
    Gong, Shuxi
    2018 IEEE INTERNATIONAL WORKSHOP ON ANTENNA TECHNOLOGY (IWAT), 2018,
  • [32] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [33] An Activity-Aware Sampling Scheme for Mobile Phones in Activity Recognition
    Chen, Zhimin
    Chen, Jianxin
    Huang, Xiangjun
    SENSORS, 2020, 20 (08)
  • [34] An experimental study of an efficient supercapacitor stacking scheme to power mobile phones
    Monteiro, Jose
    Garrido, Nuno
    Fonseca, Ricardo
    2011 IEEE 33RD INTERNATIONAL TELECOMMUNICATIONS ENERGY CONFERENCE (INTELEC), 2011,
  • [35] Mobile Phones
    Craig Duncan
    英语世界, 2017, 36 (10) : 127 - 128
  • [36] Recognition of genuine and phishing emails may not be associated with response to phishing attacks
    Crgol, Alex
    Vrhovec, Simon
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1265 - 1283
  • [37] A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning
    Barlow, Luke
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Savage, Nick
    2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2020, : 177 - 182
  • [38] A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
    Goenka, Richa
    Chawla, Meenu
    Tiwari, Namita
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 819 - 848
  • [39] A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
    Richa Goenka
    Meenu Chawla
    Namita Tiwari
    International Journal of Information Security, 2024, 23 : 819 - 848
  • [40] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561