Skip to main content

Comparative Analysis of Mobile Phishing Detection and Prevention Approaches

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 ( ICTIS 2017)

Abstract

Mobile phones have taken a crucial part in today’s transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of harmful malicious attacks like mobile phishing. In this attack, the attackers usually send the fake link via emails, SMS message, messenger, WhatsApp, etc. and ask for some credential data. Mobile phishing is fooling the users to get the sensitive personal information. This paper presents a comprehensive analysis of mobile phishing attacks, their exploitation, some of the recent solutions for phishing detection. Our survey provides a good understanding of the mobile phishing problem and currently available solutions with the future scope to deal with mobile phishing attacks conveniently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. La Polla, M., Martinelli F., Sgandurra, D.: A survey on security for mobile Devices. In: IEEE Communications Surveys & Tutorials, pp. 446–471 (2013)

    Google Scholar 

  2. Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017). Article ID 5421046. doi:10.1155/2017/5421046

  3. Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur., 1–11 (2016)

    Google Scholar 

  4. Mobile Phishing definition. https://capec.mitre.org/data/definitions/164.html

  5. Trendlabs Security Intelligence Blog. http://blog.trendmicro.com/trendlabs-security-intelligence/when-phishing-goes-mobile/

  6. Juniper report. http://venturebeat.com/2013/06/26/254158-android-apps-are-malicious-as-malware-skyrockets-614/

  7. Guo, D.F., Sui, A.F, Guo, T.: A behavior analysis based mobile malware defense system. In: 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–6. IEEE (2012)

    Google Scholar 

  8. Ashford, W. http://www.computerweekly.com/news/2240215873/Phishing-attacks-track-mobile-adoption-research-shows

  9. The CyberSecurity Source. http://www.scmagazine.com/report-malicious-apps-in-google-play-store-grow-388-percent/article/3349611

  10. Kaspersky Lab Mobile malware evolution 2015. https://securelist.com/analysis/kaspersky-security-bulletin/73839/mobile-malware-evolution-2015/

  11. Shahriar, H., Klintic, T., Clincy, V.: Mobile phishing attacks and mitigation techniques. J. Inf. Secur. 6, 206–212 (2015)

    Google Scholar 

  12. Wilson. http://www.zcorum.com/smishing-yes-its-all-bad/

  13. Foozy, C.F.M., Ahmad, R., Abdollah, M.F.: Phishing detection taxonomy for mobile device. J. Comput. Sci. 10, 338–344 (2013)

    Google Scholar 

  14. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: International Conference on Mobile IT Convergence, pp. 109–113. IEEE (2011)

    Google Scholar 

  15. Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2010)

    Google Scholar 

  16. Tanaka, M., Teshigawara, Y.: A method and its usability for user authentication by utilizing a matrix code reader on mobile phones. In: International Workshop on Information Security Applications, pp. 225–236. Springer, Heidelberg (2006)

    Google Scholar 

  17. Jonvik, T., Boning, F., Jorstad, I.: Simple strong authentication for internet applications using mobile phone. In: IEEE Global Telecommunications Conference, pp. 1–5 (2008)

    Google Scholar 

  18. Fang, X., Zhan, J.: Online banking authentication using mobile phones. In: 5th International Conference on Future Information Technology. IEEE (2010)

    Google Scholar 

  19. Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 295–300. IEEE (2007)

    Google Scholar 

  20. Gordon, M., Sankaranarayanan, S.: Biometric security mechanism in Mobile payments. In: 7th International Conference on Wireless and Optical Communications Networks (WOCN). IEEE (2010)

    Google Scholar 

  21. Asanka, N., Love, S., Scott, M.: Designing a mobile game to teach conceptual knowledge of avoiding “phishing attacks”. J. e-Learn. Secur. 2, 127–132 (2012)

    Article  Google Scholar 

  22. Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–8. IEEE (2014)

    Google Scholar 

  23. Amrutkar, C., Kim, Y.S., Traynor, P.: Detecting mobile malicious webpages in real time. IEEE Trans. Mobile Comput. (2016)

    Google Scholar 

  24. Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M.: MP-shield: a framework for phishing detection in mobile devices. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1977–1983. IEEE (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neelam Choudhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Choudhary, N., Jain, A.K. (2018). Comparative Analysis of Mobile Phishing Detection and Prevention Approaches. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics