ABSTRACT
Smartphones emerged as a sector of outstanding the growth and development with the advent of smart homes, cities, and everything. These gadgets have been integrated into ordinary human activity. Due to their influence and expansion, these gadgets are now more susceptible to attacks than other devices like desktops or laptops. Smartphones include text messaging capabilities, often known as SMS (Short Text Messages), which attackers use to target consumers. Smishing (SMS) is an assault using text messages to target smartphone users. The main purpose of the case study was to assess vulnerability of various attacks; this study investigates the threats against mobile devices and their many forms of attacks to prevent, lessen, and end these kinds of attacks and suggests various approaches to deal with the country's current problem about the sms attack problems.
- A.Parti (2022). “What is Smishing - Everything you need to know.” Available: https://www.heyhack.com/post/what-is-smishingGoogle Scholar
- M. Boodae, "Mobile Users Tluee Timcs Morc Vulncrablc to Phishing attacks" in Trusteer vol. 2012. €d, 2011Google Scholar
- K. Dunham, “Chapter 6 - Phishing. SMishing. and Vishing," in Mobile Malware Attacks and Defense. D. Ken. Ed., cd Boston:Syngress. 2009. pp. 125-l 96.Google Scholar
- Mishra, S., & Soni, D. (2021). DSmishSMS-A System to Detect Smishing SMS. Neural Computing and Applications. https://doi.org/10.1007/s00521-021-06305-yGoogle ScholarDigital Library
- Jain, A. K., & Gupta, B. B. (2018). Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science, 125, 617–623. https://doi.org/10.1016/j.procs.2017.12.079Google ScholarCross Ref
- Kim, S.-R.: Phishing of the dual criminality. IT and Legal Research 4, 251–290 (2010)Google Scholar
- Mishra S, Soni D. SMS phishing and mitigation approaches. In:Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 2019, pp. 1–5, https://doi.org/10.1109/IC3.2019.8844920.Google ScholarCross Ref
- GunikhanSonowal K, Kuppusamy S. SmiDCA: An antismishing model with machine learning approach. Comput J.Google Scholar
- ;61(8):1143–57Google Scholar
- Mishra S, Soni D. Smishing detector: a security model to detect smishing through sms content analysis and url behavior analysis. Future Gener Comput Syst 2020;108:803–15. https://doi.org/10. 1016/j.future.2020.03.021, http://www.sciencedirect.com/science/article/pii/S0167739X19318758.Google Scholar
- Mishra, S., Soni, D. Implementation of ‘Smishing Detector’: An Efficient Model for Smishing Detection Using Neural Network. SN COMPUT. SCI. 3, 189 (2022). https://doi.org/10.1007/s42979-022-01078-0Google ScholarDigital Library
- Kaspersky. 2022. What is Smishing and How to Defend Against it. Available: https://www.kaspersky.com/resource-center/threats/what-is-smishing-and-how-to-defend-against-itGoogle Scholar
Index Terms
- A Case Study on Smishing: An Assessment of Threats against Mobile Devices
Recommendations
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksSmishing, also known as SMS phishing, is a type of fraudulent communication in which an attacker disguises SMS communications to deceive a target into providing their sensitive data. Smishing attacks use a variety of tactics; however, they have a ...
S-Detector: an enhanced security model for detecting Smishing attack for mobile computing
Recently the mobile computing technology has been generally used to people with the development of the IT technology. The mobile computing environment has provided a convenient environment via the intelligent devices such as tablet PC, smartphone, etc. ...
DSmishSMS-A System to Detect Smishing SMS
AbstractWith the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these ...
Comments