Advertisement

Novel Defence Scheme for Phishing Attacks in Mobile Phones

  • C. Nivya JohnyEmail author
  • T. K. Ratheesh
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

In the day to day life we might have encountered the problem of redirecting to the unwanted page after entering the user credentials which are exactly the phishing attacks. Here the attacker will masquerade as true identity. Phishing attack are gaining importance in mobile phones as attacks on them are not well addressed and mitigated. The main reason behind this is the user preferences and habits like hesitation to use virtual keyboard, tendency to follow the hyperlinks, careless installations of applications etc. Here we propose a new scheme to address these issues and to detect phishing attacks in mobile phones. The proposed scheme operates on two dimensions based on how the attacks happens in a mobile phone viz. Website based phishing detection which detects attacks occur through websites and Application based phishing detection to detect attacks occur through the installed applications on the mobile phones. The performance evaluation showed that the proposed architecture gives 92% accuracy for websites based phishing attack detection and 90% accuracy for application based phishing attack detection.

Keywords

Website phishing detection Application phishing detection 

References

  1. 1.
    Memon, I.K., Khan, M.K.: Anti phishing for mid-range mobile phones. Int. J. Comput. Commun. Eng. 2(2), 115–119 (2013)CrossRefGoogle Scholar
  2. 2.
    Kumar, N., Chaudhary, P.: Mobile phishing detection using Naive Bayesian algorithm (2017)Google Scholar
  3. 3.
    Abura’ed, N., Otrok, H., Mizouni, R.: Mobile phishing attack for android platform (2015)Google Scholar
  4. 4.
    Bottazzi, G., Casalicchio, E., Cingolani, D.: MP-shield: a framework for phishing detection in mobile devices. In: IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications (2015)Google Scholar
  5. 5.
    Dunlop, M., Groat, S., Shelly, D.: GoldPhish: using images for content-based phishing analysis (2010)Google Scholar
  6. 6.
    Aburrous, M., Hossain, M.A., Thabatah, F., Dahal, K.: Intelligent phishing website detection system using fuzzy techniques (2008)Google Scholar
  7. 7.
    Afroz, S., Rachel, G.: PhishZoo: detecting phishing websites by looking at them. In: IEEE International Conference (2011)Google Scholar
  8. 8.
    Sunil, A., Sardana, A.: A page rank based detection technique for phishing websites. In: IEEE Symposium on Computers and Informatics (2012)Google Scholar
  9. 9.
    Wu, L., Du, X.: Effective defense schemes for phishing attacks on mobile computing platforms (2015)Google Scholar
  10. 10.
    Basnet, R., Mukkamala, S.: Detection of phishing attacks: a machine learning approach (2008)Google Scholar
  11. 11.
    Corona, I., Biggio, B.: Delta phish: detecting phishing web pages in compromised websites (2017)CrossRefGoogle Scholar
  12. 12.
    Kushwaha, M.K., Madhu, S.: Detecting phishing websites: user behaviour based (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information Technology IdukkiGovernment Engineering CollegeIdukkiIndia

Personalised recommendations