Skip to main content
Top

2018 | OriginalPaper | Chapter

Comparative Analysis of Mobile Phishing Detection and Prevention Approaches

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile phones have taken a crucial part in today’s transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of harmful malicious attacks like mobile phishing. In this attack, the attackers usually send the fake link via emails, SMS message, messenger, WhatsApp, etc. and ask for some credential data. Mobile phishing is fooling the users to get the sensitive personal information. This paper presents a comprehensive analysis of mobile phishing attacks, their exploitation, some of the recent solutions for phishing detection. Our survey provides a good understanding of the mobile phishing problem and currently available solutions with the future scope to deal with mobile phishing attacks conveniently.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference La Polla, M., Martinelli F., Sgandurra, D.: A survey on security for mobile Devices. In: IEEE Communications Surveys & Tutorials, pp. 446–471 (2013) La Polla, M., Martinelli F., Sgandurra, D.: A survey on security for mobile Devices. In: IEEE Communications Surveys & Tutorials, pp. 446–471 (2013)
2.
go back to reference Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017). Article ID 5421046. doi:10.1155/2017/5421046 Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017). Article ID 5421046. doi:10.​1155/​2017/​5421046
3.
go back to reference Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur., 1–11 (2016) Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur., 1–11 (2016)
7.
go back to reference Guo, D.F., Sui, A.F, Guo, T.: A behavior analysis based mobile malware defense system. In: 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–6. IEEE (2012) Guo, D.F., Sui, A.F, Guo, T.: A behavior analysis based mobile malware defense system. In: 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–6. IEEE (2012)
11.
go back to reference Shahriar, H., Klintic, T., Clincy, V.: Mobile phishing attacks and mitigation techniques. J. Inf. Secur. 6, 206–212 (2015) Shahriar, H., Klintic, T., Clincy, V.: Mobile phishing attacks and mitigation techniques. J. Inf. Secur. 6, 206–212 (2015)
13.
go back to reference Foozy, C.F.M., Ahmad, R., Abdollah, M.F.: Phishing detection taxonomy for mobile device. J. Comput. Sci. 10, 338–344 (2013) Foozy, C.F.M., Ahmad, R., Abdollah, M.F.: Phishing detection taxonomy for mobile device. J. Comput. Sci. 10, 338–344 (2013)
14.
go back to reference Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: International Conference on Mobile IT Convergence, pp. 109–113. IEEE (2011) Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: International Conference on Mobile IT Convergence, pp. 109–113. IEEE (2011)
15.
go back to reference Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2010) Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2010)
16.
go back to reference Tanaka, M., Teshigawara, Y.: A method and its usability for user authentication by utilizing a matrix code reader on mobile phones. In: International Workshop on Information Security Applications, pp. 225–236. Springer, Heidelberg (2006) Tanaka, M., Teshigawara, Y.: A method and its usability for user authentication by utilizing a matrix code reader on mobile phones. In: International Workshop on Information Security Applications, pp. 225–236. Springer, Heidelberg (2006)
17.
go back to reference Jonvik, T., Boning, F., Jorstad, I.: Simple strong authentication for internet applications using mobile phone. In: IEEE Global Telecommunications Conference, pp. 1–5 (2008) Jonvik, T., Boning, F., Jorstad, I.: Simple strong authentication for internet applications using mobile phone. In: IEEE Global Telecommunications Conference, pp. 1–5 (2008)
18.
go back to reference Fang, X., Zhan, J.: Online banking authentication using mobile phones. In: 5th International Conference on Future Information Technology. IEEE (2010) Fang, X., Zhan, J.: Online banking authentication using mobile phones. In: 5th International Conference on Future Information Technology. IEEE (2010)
19.
go back to reference Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 295–300. IEEE (2007) Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 295–300. IEEE (2007)
20.
go back to reference Gordon, M., Sankaranarayanan, S.: Biometric security mechanism in Mobile payments. In: 7th International Conference on Wireless and Optical Communications Networks (WOCN). IEEE (2010) Gordon, M., Sankaranarayanan, S.: Biometric security mechanism in Mobile payments. In: 7th International Conference on Wireless and Optical Communications Networks (WOCN). IEEE (2010)
21.
go back to reference Asanka, N., Love, S., Scott, M.: Designing a mobile game to teach conceptual knowledge of avoiding “phishing attacks”. J. e-Learn. Secur. 2, 127–132 (2012)CrossRef Asanka, N., Love, S., Scott, M.: Designing a mobile game to teach conceptual knowledge of avoiding “phishing attacks”. J. e-Learn. Secur. 2, 127–132 (2012)CrossRef
22.
go back to reference Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–8. IEEE (2014) Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–8. IEEE (2014)
23.
go back to reference Amrutkar, C., Kim, Y.S., Traynor, P.: Detecting mobile malicious webpages in real time. IEEE Trans. Mobile Comput. (2016) Amrutkar, C., Kim, Y.S., Traynor, P.: Detecting mobile malicious webpages in real time. IEEE Trans. Mobile Comput. (2016)
24.
go back to reference Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M.: MP-shield: a framework for phishing detection in mobile devices. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1977–1983. IEEE (2015) Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M.: MP-shield: a framework for phishing detection in mobile devices. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1977–1983. IEEE (2015)
Metadata
Title
Comparative Analysis of Mobile Phishing Detection and Prevention Approaches
Authors
Neelam Choudhary
Ankit Kumar Jain
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-63673-3_43

Premium Partner