Open Access Open Access  Restricted Access Subscription Access

Evaluation of Phishing Attack Strategies on Mobile Device Users


Affiliations
1 Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
 

Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size and shape over time as they all have unique characteristics. Therefore, this paper attempts to evaluate phishing attack strategies on mobile device users by taking into account new techniques such as phishing attacks on videoconferencing services, SMS, voice calls, emails, and social media. The study also carried out a survey with the use of a questionnaire (via google form) to gather data from 122 mobile device users across Nigeria to elicit their awareness and experience, as well as responses to phishing attacks. The aim of this paper is to bring to light, phishing attacks techniques targeted at mobile device users, to sensitize the populace and provide information on how to avoid them.

Keywords

mobile devices, phishing, attacks
User
Notifications
Font Size

  • Amro, B. (2017). Malware Detection Techniques for Mobile Devices. International Journal of Mobile Network Communication & Telematics, 7(4) 28 – 34
  • Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 2018(6), 27-35
  • APWG (2020). Phishing Activity trends Report 1st Quarter 2020 https://docs.apwg.org/reports/apwg_trends_report_q1_2020.pdf?_gl=1*1mx8oug*_ga*MTI1NTE5MTA5Ny4xNjU3MjY4NTE3*_ga_55RF0RHXSR*MTY1NzI2ODUxNi4xLjAuMTY1NzI2ODUxNi4w&_ga=2.204149143.605371871.1657268519-1255191097.1657268517 Retrieved 22 July 2020
  • Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., & Piu, M. (2015, October). MP-shield: A framework for phishing detection in mobile devices. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 1977-1983). IEEE.
  • CSO (2020). Five New Threats to Your Mobile Security. From https://www.csoonline.com/article/2157785/five-new-threats-to-your-mobile-security.html. Retrieved 26 July 2020
  • Griffin, S. E., & Rackley, C. C. (2008, September). Vishing. In Proceedings of the 5th annual conference on Information security curriculum development (pp. 33-35).
  • Srinivas, (2014). Broken cryptography. From https://resources.infosecinstitute.com/android-hacking-security-part-16-broken-cryptography/ Retrieved 26 October 2022.
  • Joshi, R. (2015). "Interactive Phishing Filter". Unpublished Master's Projects. 430. From https://scholarworks.sjsu.edu/etd_projects/430 Retrieved 22 July 2020
  • Kaspersky (2020) Top 7 Mobile Security Threats. From https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store Retrieved 23 July 2020
  • Kemp, S. (2022). Digital 2022: Global Overview Report. From https://datareportal.com/reports/digital-2022-global-overview-report#:~:text=Global%20internet%20users%3A%20Global%20internet,of%20the%20world's%20total%20population. Retrieved 26 October 2022
  • Lawrence, J. E., & Tar, U. A. (2010). Barriers to e-commerce in developing countries. Information, society and justice journal, 3(1), 23-35.
  • Odeh, A., Keshta, I., & Abdelfattah, E. (2020). Efficient detection of phishing websites using multilayer perceptron. International Journal of Interactive Mobile Technologies, 14(11), 22-31
  • Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation techniques. Journal of Information Security, 6(03), 206 – 212.
  • Whittaker, C., Ryner, B., & Nazif, M. (2010). Large-scale automatic classification of phishing pages. Available at https://storage.googleapis.com/pub-tools-public-publication-data/pdf/35580.pdf
  • Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4), 297-307.
  • Yousif, H., Al-saedi, K. H., & Al-Hassani, M. D. (2019). Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 13(10), 205 – 213.

Abstract Views: 83

PDF Views: 32




  • Evaluation of Phishing Attack Strategies on Mobile Device Users

Abstract Views: 83  |  PDF Views: 32

Authors

Adekola Ajayi
Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
Michael Segun Olajide
Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
Oluwagboyega Peter Afolabi
Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria
Oladoyin Anthony Abiodun
Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria

Abstract


Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size and shape over time as they all have unique characteristics. Therefore, this paper attempts to evaluate phishing attack strategies on mobile device users by taking into account new techniques such as phishing attacks on videoconferencing services, SMS, voice calls, emails, and social media. The study also carried out a survey with the use of a questionnaire (via google form) to gather data from 122 mobile device users across Nigeria to elicit their awareness and experience, as well as responses to phishing attacks. The aim of this paper is to bring to light, phishing attacks techniques targeted at mobile device users, to sensitize the populace and provide information on how to avoid them.

Keywords


mobile devices, phishing, attacks

References