Mobile anti-phishing: Approaches and challenges

被引:3
|
作者
Shahriar, Hossain [1 ]
Zhang, Chi [1 ]
Dunn, Stephen [1 ]
Bronte, Robert [1 ]
Sahlan, Atef [2 ]
Tarmissi, Khaled [3 ]
机构
[1] Kennesaw State Univ, Dept Informat Technol, Marietta, GA 30060 USA
[2] Alderson Broaddus Univ, Dept Comp Sci, Philippi, WV USA
[3] Umm Al Qura Univ, Dept Comp Sci, Mecca, Saudi Arabia
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 06期
关键词
Anti-phishing; mobile phishing; smishing; SYSTEM;
D O I
10.1080/19393555.2019.1691293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technology is constantly evolving, modern conveniences such as mobile devices have changed the way that society performs its daily routines and functions as a whole. Because the evolution of technology has made it almost a requirement for citizens to possess mobile device, this increase in ownership of mobile devices has also brought security issues such as phishing. A phisher intends to obtain information that will aid the hacker by appearing to the unsuspecting owner as a trustworthy entity. The goal of phishing is to fool the owners of mobile devices into giving the attacker sensitive information, such as usernames, passwords, as well as credit and debit card information. In this paper, we provide a taxonomy of mobile anti-phishing techniques on mobile devices and mitigation techniques that are available for use on mobile devices. Our goal is to provide an informative model to identify current solutions in reducing phishing attacks on mobile devices and outline limitations and future challenges.
引用
收藏
页码:178 / 193
页数:16
相关论文
共 50 条
  • [31] A Novel Anti-phishing Effectiveness Evaluator Model
    Sankhwar, Shweta
    Pandey, Dhirendra
    Khan, R. A.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
  • [32] SEFAP: An email system fox anti-phishing
    Ren, Qiong
    Mu, Yi
    Susilo, Willy
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
  • [33] POSTER: Proactive Blacklist Update for Anti-Phishing
    Lee, Lung-Hao
    Lee, Kuei-Ching
    Chen, Hsin-Hsi
    Tseng, Yuen-Hsien
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450
  • [34] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 405 - 410
  • [35] SPP: An anti-phishing single password protocol
    Gouda, Mohamed G.
    Liu, Alex X.
    Leung, Lok M.
    Alam, Mohamed A.
    COMPUTER NETWORKS, 2007, 51 (13) : 3715 - 3726
  • [36] Model for Analysing Anti-Phishing Authentication Ceremonies
    Hatunic-Webster, Edina
    Mtenzi, Fred
    O'Shea, Brendan
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 144 - 150
  • [37] Survey of Anti-phishing Tools with Detection Capabilities
    Zeydan, Hiba Zuhair
    Selamat, Ali
    Salleh, Mazleena
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 214 - 219
  • [38] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [39] Interface Design Elements for Anti-phishing Systems
    Chen, Yan
    Zahedi, Fatemeh
    Abbasi, Ahmed
    SERVICE-ORIENTED PERSPECTIVES IN DESIGN SCIENCE RESEARCH: 6TH INTERNATIONAL CONFERENCE, 2011, 6629 : 253 - 265
  • [40] Identifying an OpenID anti-phishing scheme for cyberspace
    Abbas, Haider
    Mahmoodzadeh, Moeen Qaemi
    Khan, Farrukh Aslam
    Pasha, Maruf
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 481 - 491