Mobile anti-phishing: Approaches and challenges

被引:3
|
作者
Shahriar, Hossain [1 ]
Zhang, Chi [1 ]
Dunn, Stephen [1 ]
Bronte, Robert [1 ]
Sahlan, Atef [2 ]
Tarmissi, Khaled [3 ]
机构
[1] Kennesaw State Univ, Dept Informat Technol, Marietta, GA 30060 USA
[2] Alderson Broaddus Univ, Dept Comp Sci, Philippi, WV USA
[3] Umm Al Qura Univ, Dept Comp Sci, Mecca, Saudi Arabia
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 06期
关键词
Anti-phishing; mobile phishing; smishing; SYSTEM;
D O I
10.1080/19393555.2019.1691293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technology is constantly evolving, modern conveniences such as mobile devices have changed the way that society performs its daily routines and functions as a whole. Because the evolution of technology has made it almost a requirement for citizens to possess mobile device, this increase in ownership of mobile devices has also brought security issues such as phishing. A phisher intends to obtain information that will aid the hacker by appearing to the unsuspecting owner as a trustworthy entity. The goal of phishing is to fool the owners of mobile devices into giving the attacker sensitive information, such as usernames, passwords, as well as credit and debit card information. In this paper, we provide a taxonomy of mobile anti-phishing techniques on mobile devices and mitigation techniques that are available for use on mobile devices. Our goal is to provide an informative model to identify current solutions in reducing phishing attacks on mobile devices and outline limitations and future challenges.
引用
收藏
页码:178 / 193
页数:16
相关论文
共 50 条
  • [21] NoPhish: An anti-phishing education app
    Technische Universität Darmstadt, Germany
    Lect. Notes Comput. Sci., (188-192):
  • [22] A Honeypots Based Anti-Phishing Framework
    Chauhan, Shubhika
    Shiwani, Savita
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 618 - 625
  • [23] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184
  • [24] Visual security is feeble for Anti-Phishing
    Leung, Chun-Ming
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123
  • [25] Understanding practitioners' challenges and requirements in the design, implementation, and evaluation of anti-phishing interventions
    Sarker, Orvila
    Jayatilaka, Asangi
    Haggag, Sherif
    Liu, Chelsea
    Babar, M. Ali
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 225
  • [26] Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
    Gupta, Srishti
    Kumaraguru, Ponnurangam
    PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,
  • [27] An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 105 - +
  • [28] A new approach creating an anti-phishing seal
    Luca, Daniel L.
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
  • [29] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [30] An Evaluation of Users' Anti-Phishing Knowledge Retention
    Alnajim, Abdullah
    Munro, Malcolm
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214