Mobile anti-phishing: Approaches and challenges

被引:3
|
作者
Shahriar, Hossain [1 ]
Zhang, Chi [1 ]
Dunn, Stephen [1 ]
Bronte, Robert [1 ]
Sahlan, Atef [2 ]
Tarmissi, Khaled [3 ]
机构
[1] Kennesaw State Univ, Dept Informat Technol, Marietta, GA 30060 USA
[2] Alderson Broaddus Univ, Dept Comp Sci, Philippi, WV USA
[3] Umm Al Qura Univ, Dept Comp Sci, Mecca, Saudi Arabia
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 06期
关键词
Anti-phishing; mobile phishing; smishing; SYSTEM;
D O I
10.1080/19393555.2019.1691293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technology is constantly evolving, modern conveniences such as mobile devices have changed the way that society performs its daily routines and functions as a whole. Because the evolution of technology has made it almost a requirement for citizens to possess mobile device, this increase in ownership of mobile devices has also brought security issues such as phishing. A phisher intends to obtain information that will aid the hacker by appearing to the unsuspecting owner as a trustworthy entity. The goal of phishing is to fool the owners of mobile devices into giving the attacker sensitive information, such as usernames, passwords, as well as credit and debit card information. In this paper, we provide a taxonomy of mobile anti-phishing techniques on mobile devices and mitigation techniques that are available for use on mobile devices. Our goal is to provide an informative model to identify current solutions in reducing phishing attacks on mobile devices and outline limitations and future challenges.
引用
收藏
页码:178 / 193
页数:16
相关论文
共 50 条
  • [41] Anti-Phishing Using Hadoop-Framework
    Gavahane, Mayura
    Sequeira, Derick
    Pandey, Abhishek
    Shetty, Anush
    2015 INTERNATIONAL CONFERENCE ON TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICTSD-2015), 2015,
  • [42] PhishTackle—a web services architecture for anti-phishing
    R. Gowtham
    Ilango Krishnamurthi
    Cluster Computing, 2014, 17 : 1051 - 1068
  • [43] An Anti-Phishing Method based on Feature Analysis
    Rajab, Majed
    2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, : 133 - 139
  • [44] How Effective is Anti-Phishing Training for Children?
    Lastdrager, Elmer
    Gallardo, Ines Carvajal
    Hartel, Pieter
    Junger, Marianne
    PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), 2017, : 229 - 239
  • [45] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [46] AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 595 - 607
  • [47] AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 365 - 380
  • [48] 2 Years in the anti-phishing group of a large company
    Gallo, Luigi
    Maiello, Alessandro
    Botta, Alessio
    Ventre, Giorgio
    COMPUTERS & SECURITY, 2021, 105
  • [49] Efficacy of Anti-phishing Measures and Strategies - A research Analysis
    Bindra, Gundeep Singh
    World Academy of Science, Engineering and Technology, 2010, 69 : 366 - 372
  • [50] Survey paper: Taxonomy of website anti-phishing solutions
    Zaimi, Rania
    Hafidi, Mohamed
    Lamia, Mahnane
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), 2020, : 101 - 108