Abstract
Mobile phones have taken a crucial part in today’s transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of harmful malicious attacks like mobile phishing. In this attack, the attackers usually send the fake link via emails, SMS message, messenger, WhatsApp, etc. and ask for some credential data. Mobile phishing is fooling the users to get the sensitive personal information. This paper presents a comprehensive analysis of mobile phishing attacks, their exploitation, some of the recent solutions for phishing detection. Our survey provides a good understanding of the mobile phishing problem and currently available solutions with the future scope to deal with mobile phishing attacks conveniently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
La Polla, M., Martinelli F., Sgandurra, D.: A survey on security for mobile Devices. In: IEEE Communications Surveys & Tutorials, pp. 446–471 (2013)
Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017). Article ID 5421046. doi:10.1155/2017/5421046
Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur., 1–11 (2016)
Mobile Phishing definition. https://capec.mitre.org/data/definitions/164.html
Trendlabs Security Intelligence Blog. http://blog.trendmicro.com/trendlabs-security-intelligence/when-phishing-goes-mobile/
Juniper report. http://venturebeat.com/2013/06/26/254158-android-apps-are-malicious-as-malware-skyrockets-614/
Guo, D.F., Sui, A.F, Guo, T.: A behavior analysis based mobile malware defense system. In: 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–6. IEEE (2012)
Ashford, W. http://www.computerweekly.com/news/2240215873/Phishing-attacks-track-mobile-adoption-research-shows
The CyberSecurity Source. http://www.scmagazine.com/report-malicious-apps-in-google-play-store-grow-388-percent/article/3349611
Kaspersky Lab Mobile malware evolution 2015. https://securelist.com/analysis/kaspersky-security-bulletin/73839/mobile-malware-evolution-2015/
Shahriar, H., Klintic, T., Clincy, V.: Mobile phishing attacks and mitigation techniques. J. Inf. Secur. 6, 206–212 (2015)
Foozy, C.F.M., Ahmad, R., Abdollah, M.F.: Phishing detection taxonomy for mobile device. J. Comput. Sci. 10, 338–344 (2013)
Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: International Conference on Mobile IT Convergence, pp. 109–113. IEEE (2011)
Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2010)
Tanaka, M., Teshigawara, Y.: A method and its usability for user authentication by utilizing a matrix code reader on mobile phones. In: International Workshop on Information Security Applications, pp. 225–236. Springer, Heidelberg (2006)
Jonvik, T., Boning, F., Jorstad, I.: Simple strong authentication for internet applications using mobile phone. In: IEEE Global Telecommunications Conference, pp. 1–5 (2008)
Fang, X., Zhan, J.: Online banking authentication using mobile phones. In: 5th International Conference on Future Information Technology. IEEE (2010)
Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 295–300. IEEE (2007)
Gordon, M., Sankaranarayanan, S.: Biometric security mechanism in Mobile payments. In: 7th International Conference on Wireless and Optical Communications Networks (WOCN). IEEE (2010)
Asanka, N., Love, S., Scott, M.: Designing a mobile game to teach conceptual knowledge of avoiding “phishing attacks”. J. e-Learn. Secur. 2, 127–132 (2012)
Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–8. IEEE (2014)
Amrutkar, C., Kim, Y.S., Traynor, P.: Detecting mobile malicious webpages in real time. IEEE Trans. Mobile Comput. (2016)
Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M.: MP-shield: a framework for phishing detection in mobile devices. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1977–1983. IEEE (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Choudhary, N., Jain, A.K. (2018). Comparative Analysis of Mobile Phishing Detection and Prevention Approaches. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_43
Download citation
DOI: https://doi.org/10.1007/978-3-319-63673-3_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63672-6
Online ISBN: 978-3-319-63673-3
eBook Packages: EngineeringEngineering (R0)