Evaluation of Phishing Attack Strategies on Mobile Device Users

Authors

  • Adekola Ajayi Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
  • Michael Segun Olajide Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
  • Oluwagboyega Peter Afolabi Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
  • Oladoyin Anthony Abiodun Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria

DOI:

https://doi.org/10.24203/ijcit.v12i1.312

Keywords:

mobile devices, phishing, attacks

Abstract

Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size and shape over time as they all have unique characteristics. Therefore, this paper attempts to evaluate phishing attack strategies on mobile device users by taking into account new techniques such as phishing attacks on videoconferencing services, SMS, voice calls, emails, and social media. The study also carried out a survey with the use of a questionnaire (via google form) to gather data from 122 mobile device users across Nigeria to elicit their awareness and experience, as well as responses to phishing attacks. The aim of this paper is to bring to light, phishing attacks techniques targeted at mobile device users, to sensitize the populace and provide information on how to avoid them.

References

Amro, B. (2017). Malware Detection Techniques for Mobile Devices. International Journal of Mobile Network Communication & Telematics, 7(4) 28 – 34

Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 2018(6), 27-35

APWG (2020). Phishing Activity trends Report 1st Quarter 2020 https://docs.apwg.org/reports/apwg_trends_report_q1_2020.pdf?_gl=1*1mx8oug*_ga*MTI1NTE5MTA5Ny4xNjU3MjY4NTE3*_ga_55RF0RHXSR*MTY1NzI2ODUxNi4xLjAuMTY1NzI2ODUxNi4w&_ga=2.204149143.605371871.1657268519-1255191097.1657268517 Retrieved 22 July 2020

Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., & Piu, M. (2015, October). MP-shield: A framework for phishing detection in mobile devices. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 1977-1983). IEEE.

CSO (2020). Five New Threats to Your Mobile Security. From https://www.csoonline.com/article/2157785/five-new-threats-to-your-mobile-security.html. Retrieved 26 July 2020

Griffin, S. E., & Rackley, C. C. (2008, September). Vishing. In Proceedings of the 5th annual conference on Information security curriculum development (pp. 33-35).

Srinivas, (2014). Broken cryptography. From https://resources.infosecinstitute.com/android-hacking-security-part-16-broken-cryptography/ Retrieved 26 October 2022.

Joshi, R. (2015). "Interactive Phishing Filter". Unpublished Master's Projects. 430. From https://scholarworks.sjsu.edu/etd_projects/430 Retrieved 22 July 2020

Kaspersky (2020) Top 7 Mobile Security Threats. From https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store Retrieved 23 July 2020

Kemp, S. (2022). Digital 2022: Global Overview Report. From https://datareportal.com/reports/digital-2022-global-overview-report#:~:text=Global%20internet%20users%3A%20Global%20internet,of%20the%20world's%20total%20population. Retrieved 26 October 2022

Lawrence, J. E., & Tar, U. A. (2010). Barriers to e-commerce in developing countries. Information, society and justice journal, 3(1), 23-35.

Odeh, A., Keshta, I., & Abdelfattah, E. (2020). Efficient detection of phishing websites using multilayer perceptron. International Journal of Interactive Mobile Technologies, 14(11), 22-31

Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation techniques. Journal of Information Security, 6(03), 206 – 212.

Whittaker, C., Ryner, B., & Nazif, M. (2010). Large-scale automatic classification of phishing pages. Available at https://storage.googleapis.com/pub-tools-public-publication-data/pdf/35580.pdf

Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4), 297-307.

Yousif, H., Al-saedi, K. H., & Al-Hassani, M. D. (2019). Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 13(10), 205 – 213.

Downloads

Published

2023-03-31

Issue

Section

Articles

How to Cite

Evaluation of Phishing Attack Strategies on Mobile Device Users. (2023). International Journal of Computer and Information Technology(2279-0764), 12(1). https://doi.org/10.24203/ijcit.v12i1.312

Similar Articles

1-10 of 15

You may also start an advanced similarity search for this article.