Skip to main content

Anti-phishing Models for Mobile Application Development: A Review Paper

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 932))

Abstract

In cyberspace one of the major security issue is phishing attacks. Phishing attacks are the most treacherous form of fraudulent activities of mobile and desktop. With the growing usage of smartphones, user find it convenient to keep their private data on mobile phones which allows phishers to exploit mobile devices for ingathering valuable data. The limitation of small screen size and low computational power makes mobile phones security vulnerable to more phishing attacks compared to desktop computers. Mostly, mobile users stay online so increase the chance of being phished. Moreover, to avoid phishing attacks malware detection and filtering system should be deployed and companies should educate their users about diversity of phishing attacks. Until now, no such effective anti-mobile phishing technique has been invented or adopted that can precisely distinguish authentic and phishing websites. However, many research has been done in this regard. In this paper, a detailed discussion is presented on several anti-mobile phishing models based on various methods for preventing users to evade phishing attacks. Furthermore, many issues and challenges faced while preventing users from phishing attacks are also elaborated. Lastly, the experimental result based on the evaluation of models are presented and using these facts suggested that which model can effectively and accurately detect malicious sites.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chorghe, S.P., Shekokar, N.: A survey on anti-phishing techniques in mobile phones. In: Inventive Computation Technologies (ICICT). IEEE (2017)

    Google Scholar 

  2. Jain, A.K., Gupta, B.B.: Rule-based framework for detection of smishing messages in mobile environment. In: 6th International Conference on Smart Computing and Communications, ICSCC, India (2017)

    Google Scholar 

  3. Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing Workshops (2007)

    Google Scholar 

  4. Sonowal, G., Kuppusamy, K.S.: PhiDMA – a phishing detection model with multi-filter approach. J. King Saud Univ.-Comput. Inf. Sci. (2017)

    Google Scholar 

  5. Yue, C., Wang, H.: Anti-phishing in offense and defense. In: Computer Security Applications Conference. IEEE (2008)

    Google Scholar 

  6. Ndibwile, J.D., Kadobayashi, Y., Fall, D.: UnPhishMe: phishing attack detection by deceptive login simulation through an android mobile app. In: 12th Asia Joint Conference on Information Security, Japan (2017)

    Google Scholar 

  7. Longfei, W., Xiaojiang, D., Jie, W.: Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Trans. Veh. Technol. 65(8), 6678–6691 (2015)

    Google Scholar 

  8. APWG: phishing attack campaigns in 2016 shatter all previous years’ records. Phishing activity trends report 4th quarter (2016)

    Google Scholar 

  9. Abutair, Y.A., Belghith, A.: Using case-based reasoning for phishing detection. In: 8th International Conference on Ambient Systems, Networks and Technologies (2017)

    Google Scholar 

  10. Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016)

    Google Scholar 

  11. Das, A., Ullah, H.: Security behaviors of smartphone users. Inf. Comput. Secur. (ICS) 24(1), 116–134 (2016)

    Google Scholar 

  12. Jansson, K., Solms, V.: Phishing for phishing awareness. Behav. Inf. Technol. 32(6), 584–593 (2013)

    Google Scholar 

  13. Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., Zanero, S.: A fast eavesdropping attack against touchscreens. In: 7th International Conference on Information Assurance and Security. IEEE (2011)

    Google Scholar 

  14. Longfei, W., Xiaojiang, D., Xinwen, F.: Security threats to mobile multimedia applications: camera-based attacks on mobile phones. IEEE Commun. Mag. 52(3), 80–87 (2014)

    Google Scholar 

  15. Fenz, S., Heurix, J., Neubauer, T., Pechstein, F.: Current challenges in information security risk management. Inf. Manag. Comput. Secur. 22(5), 410–430 (2014)

    Google Scholar 

  16. Marforio, C., Masti, R.J., Soriente, C., Kostiainen, K., Capkun, S.: Personalized security indicators to detect application phishing attacks in mobile platforms. Technical report (2015)

    Google Scholar 

  17. Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M.: MP-Shield: a framework for phishing detection in mobile devices. In: International Conference on Computer and Information Technology. IEEE (2015)

    Google Scholar 

  18. Foozy, M., Feresa, C., Ahmad, R., Abdollah, M.F.: A practical rule based technique by splitting SMS phishing from SMS spam for better accuracy in mobile device. Int. Rev. Comput. Softw. 9(10), 1776–1782 (2014)

    Google Scholar 

  19. Thomas, T.: Mobile phishing: thief right in your pocket. Managing Information Risk, AUJAS (2015)

    Google Scholar 

  20. Aaron, G., Rasmussen, R.: Global phishing survey: trends and domain name use in 2H. APWG (2013)

    Google Scholar 

  21. Aleroud, A., Zhou, L.: Phishing environments, techniques, and countermeasures: a survey. Comput. Secur. 68, 160–196 (2017)

    Google Scholar 

  22. Amro, B.: Phishing techniques in mobile devices. J. Comput. Commun. 6(2), 27–35 (2018)

    Google Scholar 

  23. Ferrara, J.: Social engineering and how to counteract advanced attacks (2013)

    Google Scholar 

  24. Ramzan, Z.: Phishing attacks and countermeasures. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 433–448. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04117-4_23

    Google Scholar 

  25. Abu-Nimeh, S., Nair, S.: Phishing attacks in a mobile environment (2016)

    Google Scholar 

  26. Herfurt, M.: Detecting and attacking bluetooth-enabled cellphones at the hannover fairground. CeBIT (2004)

    Google Scholar 

  27. Chaudhry, J.A., Chaudhry, S.A., Rittenhouse, R.G.: Phishing attacks and defenses. Int. J. Secur. Appl. 10(1), 247–256 (2016)

    Google Scholar 

  28. Thakur, H., Kaur, S.: A survey paper on phishing detection. Int. J. Adv. Res. Comput. Sci. (2016)

    Google Scholar 

  29. Richter, M.M., Weber, R.O.: Case-Based Reasoning. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40167-1

    Google Scholar 

  30. Aamodt, A., Plaza, E.: Case-based reasoning: foundational issues, methodological variations, and system approaches. AI Commun. 7(1), 39–59 (1994)

    Google Scholar 

  31. Cranor, L.F.: A framework for reasoning about the human in the loop. In: Proceedings of the 1st Conference on Usability, Psychology and Security. USENIX Association (2008)

    Google Scholar 

  32. Bicakci, K., Unal, D., Asciogluc, N., Adalier, O.: Mobile authentication secure against man-in-the-middle attacks. In: 11th International Conference on Mobile Systems and Pervasive Computing (2014)

    Google Scholar 

  33. Wright, R.T., Marett, K.: The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived. J. Manag. Inf. Syst. 27(1), 273–303 (2010)

    Google Scholar 

  34. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, New York (2008)

    Google Scholar 

  35. Tewari, A., Jain, A.K., Gupta, B.B.: Recent survey of various defense mechanisms against phishing attacks. J. Inf. Priv. Secur. 12(1), 3–13 (2016)

    Google Scholar 

  36. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Comput. J. Mag. (2011)

    Google Scholar 

  37. Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017)

    Google Scholar 

  38. Rosiello, A.P.E., Kirdr, E., Kruegel, C., Ferrandi, F.: A layout-similarity-based approach for detecting phishing pages. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops (2007)

    Google Scholar 

  39. Merwe, A.V.D., Seker, R., Gerber, A.: Phishing in the system of systems settings: mobile technology. In: International Conference on Systems, Man and Cybernetics. IEEE (2005)

    Google Scholar 

  40. Merwe, V.D., Loock, A.M., Dabrowski, M.: Characteristics and responsibilities involved in a Phishing attack. In: Proceedings of the Winter International Symposium on Information and Communication Technologies, Cape Town (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javaria Khalid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khalid, J., Jalil, R., Khalid, M., Maryam, M., Shafique, M.A., Rasheed, W. (2019). Anti-phishing Models for Mobile Application Development: A Review Paper. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6052-7_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6051-0

  • Online ISBN: 978-981-13-6052-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics