Phishing techniques in mobile systems
DOI: 10.31673/2409-7292.2022.014449
DOI:
https://doi.org/10.31673/2409-7292.2022.014449Abstract
The rapid development of mobile devices and communication technologies has led to a sharp increase in the number of mobile device users. The mobile device has replaced many other devices and is used for many tasks, from making a phone call to important and confidential tasks such as cash payments. Because a mobile device accompanies a person most of the time, it is very likely that it contains that person's personal and confidential information. Wider use of mobile devices in everyday life has made mobile systems a great target for attacks. One of the most important attacks is a phishing attack, in which an attacker tries to obtain the victim's credentials and impersonate him. This paper analyzes different types of phishing attacks on mobile devices. Mitigation methods are also analyzed - methods of protection against phishing. An assessment of each method and a summary of its advantages and disadvantages are given. Finally, important steps are taken to protect against phishing attacks. The purpose of the work is to cover phishing attacks on mobile systems, inform people about these attacks and how to avoid them.
Keywords: spyware, phishing, phishing protection, mobile device, mobile application, security, privacy.
References
1. https://wearesocial.com/special-reports/digital-in-2017-global-overview
2. http://www.gartner.com/newsroom/id/3609817
3. Aijaz Ahmad, S., et al. (2013) Smartphone: Android vs IOS. The SIJ Transactions on Computer Science Engineering & Its Applications (CSEA), 1, 141-148.
4. US Government (2016) How to Protect Your Network from Ransomware. Technical Guidance Interagency Document. US Government, Washington, DC.
5. PhishMe, Inc. (2016) Malware Review Q3. PhishMe, Inc., Leesburg, VA.
6. https://www.fau.eu/2016/08/25/news/research/one-in-two-users-click-on-links-fro m-unknown-senders/
7. Luminzu Mudiri, J. (2012) Fraud in Mobile Financial Services. MicroSave, Lucknow.
8. Buku, M.W. and Mazer, R. (2015) Fraud in Mobile Financial Services: Protecting Consumers, Providers, and the System. CGAP, Washington, DC.
9. http://resources.infosecinstitute.com/spear-phishing-real-life-examples/#gref
10. https://www.scmagazineuk.com/leoni-ag-suffers-34-million-whaling-attack/article/ 530694/
11. WANDERA (2017) Mobile Data Report: Focus on Phishing.
12. Yoon, J.W., et al. (2010) Hybrid Spam Filtering for Mobile Communication. Computers and Se-curity, 29, 446-459. https://doi.org/10.1016/j.cose.2009.11.003
13. Memon, I.K. and Khan, M.K. (2013) Anti Phishing for Mid-Range Mobile Phones. International Journal of Computer and Communication Engineering, 2, 115-119.
14. Singh, D., et al. (2011) Telephony Fraud Prevention. US Patent.
15. Mahmoud, T.M. and Mahfouz, A.M. (2012) SMS Spam Filtering Technique Based on Artificial Immune System. IJCSI International Journal of Computer Science Issues, 9, 589-597.
16. Mishra, M., et al. (2012) A Preventive Anti-Phishing Technique using Code Word. International Journal of Computer Science and Information Technologies, 3, 4248-4250
17. Archana, M., et al. (2011) Architecture for the Detection of Phishing in Mobile Internet. Interna-tional Journal of Computer Science and Information Technologies, 2, 1297-1299.
18. Malisa, L., et al. (2015) Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
19. Kumar, N. and Chaudhary, P. (2017) Mobile Phishing Detection using Naive Bayesian Algo-rithm. International Journal of Computer Science and Network Security, 17, 142-147. [20] Orunso-lu, A.A. (2017) A Lightweight Anti-Phishing Technique for Mobile Phone. Acta Informatica Pra-gensia, 6, 114-123.
20. Yenurkar, B. and Zade, S. (2014) An Anti-Phishing Framework with New Validation Scheme Using Visual Cryptography. International Journal of Computer Science and Mobile Computing, 3, 739-744.
21. Bottazzi, G. (2015) MP-Shield: A Framework for Phishing Detection in Mobile Devices. IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Com-puting, Liverpool, 26-28 October 2015, 1977-1983.
22. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.293
23. http://onlinesecurity.trendmicro.com.au/blog/2016/06/22/phishlabs-warns-of-malw are-posing-as-legitapps-on-google-play/