Comparative Analysis of Mobile Phishing Detection and Prevention Approaches

Mobile phones have taken a crucial part in today’s transferable computer world. Mobile devices are more popular these days because of their small screen size, lower production cost, and portability. Because of their popularity, these devices seem to be a perfect target of harmful malicious attacks like mobile phishing. In this attack, the attackers usually send the fake link via emails, SMS message, messenger, WhatsApp, etc. and ask for some credential data. Mobile phishing is fooling the users to get the sensitive personal information. This paper presents a comprehensive analysis of mobile phishing attacks, their exploitation, some of the recent solutions for phishing detection. Our survey provides a good understanding of the mobile phishing problem and currently available solutions with the future scope to deal with mobile phishing attacks conveniently.

[1]  Mohd Faizal Abdollah,et al.  Phishing detection taxonomy for mobile device , 2013 .

[2]  Longfei Wu,et al.  MobiFish: A lightweight anti-phishing scheme for mobile phones , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[3]  Tao Guo,et al.  A behavior analysis based Mobile Malware Defense System , 2012, ICSPCS.

[4]  Weili Han,et al.  Anti-Phishing by Smart Mobile Device , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[5]  Suresh Sankaranarayanan,et al.  Biometric security mechanism in Mobile paymentts , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[6]  Ankit Kumar Jain,et al.  Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.

[7]  Ankit Kumar Jain,et al.  A novel approach to protect against phishing attacks at client side using auto-updated white-list , 2016, EURASIP Journal on Information Security.

[8]  Justin Zhan,et al.  Online Banking Authentication Using Mobile Phones , 2010, 2010 5th International Conference on Future Information Technology.

[9]  Patrick Traynor,et al.  Detecting Mobile Malicious Webpages in Real Time , 2017, IEEE Transactions on Mobile Computing.

[10]  Steve Love,et al.  Designing a Mobile Game to Teach Conceptual Knowledge of Avoiding 'Phishing Attacks' , 2012 .

[11]  Giovanni Bottazzi,et al.  MP-Shield: A Framework for Phishing Detection in Mobile Devices , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[12]  Hyotaek Lim,et al.  Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[13]  Yoshimi Teshigawara,et al.  A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones , 2006, WISA.

[14]  Hossain Shahriar,et al.  Mobile Phishing Attacks and Mitigation Techniques , 2015 .

[15]  Dongho Won,et al.  A mobile based anti-phishing authentication scheme using QR code , 2011, International Conference on Mobile IT Convergence.

[16]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[17]  Do Van Thanh,et al.  Simple Strong Authentication for Internet Applications Using Mobile Phones , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.