skip to main content
10.1145/3605423.3605446acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicctaConference Proceedingsconference-collections
research-article

A Case Study on Smishing: An Assessment of Threats against Mobile Devices

Published:20 August 2023Publication History

ABSTRACT

Smartphones emerged as a sector of outstanding the growth and development with the advent of smart homes, cities, and everything. These gadgets have been integrated into ordinary human activity. Due to their influence and expansion, these gadgets are now more susceptible to attacks than other devices like desktops or laptops. Smartphones include text messaging capabilities, often known as SMS (Short Text Messages), which attackers use to target consumers. Smishing (SMS) is an assault using text messages to target smartphone users. The main purpose of the case study was to assess vulnerability of various attacks; this study investigates the threats against mobile devices and their many forms of attacks to prevent, lessen, and end these kinds of attacks and suggests various approaches to deal with the country's current problem about the sms attack problems.

References

  1. A.Parti (2022). “What is Smishing - Everything you need to know.” Available: https://www.heyhack.com/post/what-is-smishingGoogle ScholarGoogle Scholar
  2. M. Boodae, "Mobile Users Tluee Timcs Morc Vulncrablc to Phishing attacks" in Trusteer vol. 2012. €d, 2011Google ScholarGoogle Scholar
  3. K. Dunham, “Chapter 6 - Phishing. SMishing. and Vishing," in Mobile Malware Attacks and Defense. D. Ken. Ed., cd Boston:Syngress. 2009. pp. 125-l 96.Google ScholarGoogle Scholar
  4. Mishra, S., & Soni, D. (2021). DSmishSMS-A System to Detect Smishing SMS. Neural Computing and Applications. https://doi.org/10.1007/s00521-021-06305-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jain, A. K., & Gupta, B. B. (2018). Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science, 125, 617–623. https://doi.org/10.1016/j.procs.2017.12.079Google ScholarGoogle ScholarCross RefCross Ref
  6. Kim, S.-R.: Phishing of the dual criminality. IT and Legal Research 4, 251–290 (2010)Google ScholarGoogle Scholar
  7. Mishra S, Soni D. SMS phishing and mitigation approaches. In:Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 2019, pp. 1–5, https://doi.org/10.1109/IC3.2019.8844920.Google ScholarGoogle ScholarCross RefCross Ref
  8. GunikhanSonowal K, Kuppusamy S. SmiDCA: An antismishing model with machine learning approach. Comput J.Google ScholarGoogle Scholar
  9. ;61(8):1143–57Google ScholarGoogle Scholar
  10. Mishra S, Soni D. Smishing detector: a security model to detect smishing through sms content analysis and url behavior analysis. Future Gener Comput Syst 2020;108:803–15. https://doi.org/10. 1016/j.future.2020.03.021, http://www.sciencedirect.com/science/article/pii/S0167739X19318758.Google ScholarGoogle Scholar
  11. Mishra, S., Soni, D. Implementation of ‘Smishing Detector’: An Efficient Model for Smishing Detection Using Neural Network. SN COMPUT. SCI. 3, 189 (2022). https://doi.org/10.1007/s42979-022-01078-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kaspersky. 2022. What is Smishing and How to Defend Against it. Available: https://www.kaspersky.com/resource-center/threats/what-is-smishing-and-how-to-defend-against-itGoogle ScholarGoogle Scholar

Index Terms

  1. A Case Study on Smishing: An Assessment of Threats against Mobile Devices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCTA '23: Proceedings of the 2023 9th International Conference on Computer Technology Applications
      May 2023
      270 pages
      ISBN:9781450399579
      DOI:10.1145/3605423

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)58
      • Downloads (Last 6 weeks)15

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format