Efficient Approach for Mitigating Mobile Phishing Attacks

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 476
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Hyungkyuko
dc.contributor.authorLee, Younhoko
dc.contributor.authorSeo, Changhoko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2018-10-19T00:31:13Z-
dc.date.available2018-10-19T00:31:13Z-
dc.date.created2018-09-01-
dc.date.created2018-09-01-
dc.date.created2018-09-01-
dc.date.issued2018-09-
dc.identifier.citationIEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996-
dc.identifier.issn0916-8516-
dc.identifier.urihttp://hdl.handle.net/10203/245911-
dc.description.abstractWe propose a method for efficiently detecting phishing attacks in mobile environments. When a user visits a website of a certain URL, the proposed method first compares the URL to a generated whitelist. If the URL is not in the whitelist, it detects if the site is a phishing site based on the results of Google search with a carefully refined URL. In addition, the phishing detection is performed only when the user provides input to the website, thereby reducing the frequency of invoking phishing detection to decrease the amount of power used. We implemented the proposed method and used 8315 phishing sites and the same number of legitimate websites for evaluating the performance of the proposed method. We achieved a phishing detection rate of 99.22% with 81.22% reduction in energy consumption as compared to existing approaches that also use search engine for phishing detection. Moreover, because the proposed method does not employ any other algorithm, software, or comparison group, the proposed method can be easily deployed.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleEfficient Approach for Mitigating Mobile Phishing Attacks-
dc.typeArticle-
dc.identifier.wosid000444151600005-
dc.identifier.scopusid2-s2.0-85053847390-
dc.type.rimsART-
dc.citation.volumeE101B-
dc.citation.issue9-
dc.citation.beginningpage1982-
dc.citation.endingpage1996-
dc.citation.publicationnameIEICE TRANSACTIONS ON COMMUNICATIONS-
dc.identifier.doi10.1587/transcom.2018EBP3020-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorLee, Younho-
dc.contributor.nonIdAuthorSeo, Changho-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthormobile phishing-
dc.subject.keywordAuthormobile phishing detection-
dc.subject.keywordAuthorphishing detection-
dc.subject.keywordAuthormobile security-
dc.subject.keywordAuthorsecurity-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0