A Solution to Detect Phishing in Android Devices

作者: Sharvari Prakash Chorghe , Narendra Shekokar

DOI: 10.1007/978-3-319-49806-5_25

关键词: World Wide WebHeuristicsPhishingAndroid (operating system)Computer securityStatic analysisMobile deviceWeb pageSupport vector machinePopulationComputer science

摘要: Android OS is currently one of the most popular operating system in smartphones. Majority population today uses android phone. Use smartphone not bounded to calling, messaging apps or Video Chats but users use it for financial transactions as well. There an exponential growth mobile services. Phishing major security threats devices various reasons. Mobile phishing dangerous because hardware limitations device and user attitude while using services on device. widely investigated desktop environment there very little research techniques detect Device. The proposed a mechanism detection devices. It hybrid solution defend against zero-day attacks. includes 5 modules; URL Extraction, Static Analysis URL, Web Page Foot printing, Based Heuristics SVM classifier. was evaluated dataset with 200 websites URLs legitimate website URLs. results show that 92% accuracy achieved by system.

参考文章(13)
Mohammed Nazim Feroz, Susan Mengel, Phishing URL Detection Using URL Ranking 2015 IEEE International Congress on Big Data. pp. 635- 638 ,(2015) , 10.1109/BIGDATACONGRESS.2015.97
Ee Hung Chang, Kang Leng Chiew, San Nah Sze, Wei King Tiong, Phishing Detection via Identification of Website Identity 2013 International Conference on IT Convergence and Security (ICITCS). pp. 1- 4 ,(2013) , 10.1109/ICITCS.2013.6717870
Ram B. Basnet, Tenzin Doleck, Towards Developing a Tool to Detect Phishing URLs: A Machine Learning Approach computational intelligence. pp. 220- 223 ,(2015) , 10.1109/CICT.2015.63
Rami M Mohammad, Fadi Thabtah, Lee McCluskey, None, Intelligent rule-based phishing websites classification Iet Information Security. ,vol. 8, pp. 153- 160 ,(2014) , 10.1049/IET-IFS.2013.0202
Matthew Dunlop, Stephen Groat, David Shelly, GoldPhish: Using Images for Content-Based Phishing Analysis international conference on internet monitoring and protection. pp. 123- 128 ,(2010) , 10.1109/ICIMP.2010.24
Neda Abdelhamid, Multi-label rules for phishing classification Applied Computing and Informatics. ,vol. 11, pp. 29- 46 ,(2015) , 10.1016/J.ACI.2014.07.002
Luong Anh Tuan Nguyen, Ba Lam To, Huu Khuong Nguyen, Minh Hoang Nguyen, Detecting phishing web sites: A heuristic URL-based approach autonomic and trusted computing. pp. 597- 602 ,(2013) , 10.1109/ATC.2013.6698185
Longfei Wu, Xiaojiang Du, Jie Wu, MobiFish: A lightweight anti-phishing scheme for mobile phones 2014 23rd International Conference on Computer Communication and Networks (ICCCN). pp. 1- 8 ,(2014) , 10.1109/ICCCN.2014.6911743
Oliver D. Anderson, Accuracy and Precision Teaching Statistics. ,vol. 14, pp. 2- 5 ,(1992) , 10.1111/J.1467-9639.1992.TB00229.X
Syamantak Mukhopadhyay, David Argles, An Anti-Phishing mechanism for single sign-on based on QR-code international conference on information society. pp. 505- 508 ,(2011) , 10.1109/I-SOCIETY18435.2011.5978554