2017
DOI: 10.18267/j.aip.104
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Anti-Phishing Technique for Mobile Phone

Abstract: Mobile phones have become an essential device for accessing the web. This is due to the advantages of portability, lower cost and ease. However, the adoption of mobile phones for online activities is now being challenged by myriads of cybercrimes. One of such crimes is phishing attack. In this work, a lightweight anti-phishing technique is proposed to combat phishing attacks on mobile devices. This is necessary because these mobile platforms have increased the attack surface for phishers while diminishing the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The main drawback of the blacklist model is the period of time needed to recognize the phishing sites; sometimes it takes zero-day (0_day) and sometimes takes months which is enough time to fraud for multiple victims. The second solution is heuristics-based solutions, where the heuristics algorithms study the URL features and predict if the URL is trusted or malicious [10].…”
Section: Prior Workmentioning
confidence: 99%
“…The main drawback of the blacklist model is the period of time needed to recognize the phishing sites; sometimes it takes zero-day (0_day) and sometimes takes months which is enough time to fraud for multiple victims. The second solution is heuristics-based solutions, where the heuristics algorithms study the URL features and predict if the URL is trusted or malicious [10].…”
Section: Prior Workmentioning
confidence: 99%
“…In [20], a light weight technique is used. It uses some URL features to determine legitimacy of a webpage based on frequency analysis of extracted features phishing URLs.…”
Section: B Amro Journal Of Computer and Communicationsmentioning
confidence: 99%