Evaluation of Phishing Attack Strategies on Mobile Device Users
DOI:
https://doi.org/10.24203/ijcit.v12i1.312Keywords:
mobile devices, phishing, attacksAbstract
Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size and shape over time as they all have unique characteristics. Therefore, this paper attempts to evaluate phishing attack strategies on mobile device users by taking into account new techniques such as phishing attacks on videoconferencing services, SMS, voice calls, emails, and social media. The study also carried out a survey with the use of a questionnaire (via google form) to gather data from 122 mobile device users across Nigeria to elicit their awareness and experience, as well as responses to phishing attacks. The aim of this paper is to bring to light, phishing attacks techniques targeted at mobile device users, to sensitize the populace and provide information on how to avoid them.
References
Amro, B. (2017). Malware Detection Techniques for Mobile Devices. International Journal of Mobile Network Communication & Telematics, 7(4) 28 – 34
Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 2018(6), 27-35
APWG (2020). Phishing Activity trends Report 1st Quarter 2020 https://docs.apwg.org/reports/apwg_trends_report_q1_2020.pdf?_gl=1*1mx8oug*_ga*MTI1NTE5MTA5Ny4xNjU3MjY4NTE3*_ga_55RF0RHXSR*MTY1NzI2ODUxNi4xLjAuMTY1NzI2ODUxNi4w&_ga=2.204149143.605371871.1657268519-1255191097.1657268517 Retrieved 22 July 2020
Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., & Piu, M. (2015, October). MP-shield: A framework for phishing detection in mobile devices. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 1977-1983). IEEE.
CSO (2020). Five New Threats to Your Mobile Security. From https://www.csoonline.com/article/2157785/five-new-threats-to-your-mobile-security.html. Retrieved 26 July 2020
Griffin, S. E., & Rackley, C. C. (2008, September). Vishing. In Proceedings of the 5th annual conference on Information security curriculum development (pp. 33-35).
Srinivas, (2014). Broken cryptography. From https://resources.infosecinstitute.com/android-hacking-security-part-16-broken-cryptography/ Retrieved 26 October 2022.
Joshi, R. (2015). "Interactive Phishing Filter". Unpublished Master's Projects. 430. From https://scholarworks.sjsu.edu/etd_projects/430 Retrieved 22 July 2020
Kaspersky (2020) Top 7 Mobile Security Threats. From https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store Retrieved 23 July 2020
Kemp, S. (2022). Digital 2022: Global Overview Report. From https://datareportal.com/reports/digital-2022-global-overview-report#:~:text=Global%20internet%20users%3A%20Global%20internet,of%20the%20world's%20total%20population. Retrieved 26 October 2022
Lawrence, J. E., & Tar, U. A. (2010). Barriers to e-commerce in developing countries. Information, society and justice journal, 3(1), 23-35.
Odeh, A., Keshta, I., & Abdelfattah, E. (2020). Efficient detection of phishing websites using multilayer perceptron. International Journal of Interactive Mobile Technologies, 14(11), 22-31
Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation techniques. Journal of Information Security, 6(03), 206 – 212.
Whittaker, C., Ryner, B., & Nazif, M. (2010). Large-scale automatic classification of phishing pages. Available at https://storage.googleapis.com/pub-tools-public-publication-data/pdf/35580.pdf
Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4), 297-307.
Yousif, H., Al-saedi, K. H., & Al-Hassani, M. D. (2019). Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 13(10), 205 – 213.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Adekola Ajayi, Michael Segun Olajide, Oluwagboyega Peter Afolabi, Oladoyin Anthony Abiodun
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The articles published in International Journal of Computer and Information Technology (IJCIT) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.