Skip to main content

A Solution to Detect Phishing in Android Devices

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10063))

Included in the following conference series:

  • 1191 Accesses

Abstract

Android OS is currently one of the most popular operating system in smartphones. Majority of the population today uses android phone. Use of smartphone is not bounded to calling, messaging apps or Video Chats but the users use it for financial transactions as well. There is an exponential growth in use of mobile services. Phishing is one of the major security threats in mobile devices for various reasons. Mobile phishing is dangerous because of hardware limitations of the device and the user attitude while using services on the device. Phishing is widely investigated in desktop environment but there is very little research on techniques to detect phishing on Android Device. The proposed system is a mechanism for detection of phishing on Android mobile devices. It is a hybrid solution to defend against zero-day phishing attacks. It includes 5 modules; URL Extraction, Static Analysis of URL, Web Page Foot printing, URL Based Heuristics and the SVM classifier. The system was evaluated using a dataset with 200 phishing websites URLs and 200 legitimate website URLs. The results show that 92% accuracy was achieved by the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Android. https://www.android.com/

  2. Phishing. https://en.wikipedia.org/wiki/Phishing

  3. Anti Phishing Working Group (APWG). http://www.antiphishing.org/

  4. Nguyen, L.A.T., et al.: Detecting phishing web sites: a heuristic URL-based approach. In: 2013 International Conference on Advanced Technologies for Communications (ATC 2013). IEEE (2013)

    Google Scholar 

  5. Dunlop, M., Groat, S., Shelly, D.: Goldphish: using images for content-based phishing analysis. In: 2010 Fifth International Conference on Internet Monitoring and Protection (ICIMP). IEEE (2010)

    Google Scholar 

  6. Basnet, R.B., Doleck, T.: Towards developing a tool to detect phishing URLs: a machine learning approach. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT). IEEE (2015)

    Google Scholar 

  7. Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress). IEEE (2015)

    Google Scholar 

  8. Chang, E.H., Chiew, K.L., Tiong, W.K.: Phishing detection via identification of website identity. In: 2013 International Conference on IT Convergence and Security (ICITCS). IEEE (2013)

    Google Scholar 

  9. Geng, G.-G., et al.: Favicon-a clue to phishing sites detection. eCrime Researchers Summit (eCRS). IEEE (2013)

    Google Scholar 

  10. Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE (2014)

    Google Scholar 

  11. PhishTank. http://www.phishtank.com/what_is_phishing

  12. Bottazzi, G., et al.: MP-Shield: a framework for phishing detection in mobile devices. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE (2015)

    Google Scholar 

  13. Mohammad, R.M., Thabtah, F., McCluskey, L.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8(3), 153–160 (2014)

    Article  Google Scholar 

  14. Mukhopadhyay, S., Argles, D.: An anti-phishing mechanism for single sign-on based on QR-code. In: 2011 International Conference on Information Society (i-Society). IEEE (2011)

    Google Scholar 

  15. Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing - Workshops (2007)

    Google Scholar 

  16. Vibhuti, K.P., et al.: Safe internet browsing using heuristic based technique. Int. J. Eng. Dev. Res. 2, 1759–1766 (2014)

    Google Scholar 

  17. Siddiqui, A.T., Zamani, A.S., Ahmed, J.: Android security model that provide a base operating system. J. Telecommun. 13(1), 36–43 (2012)

    Google Scholar 

  18. PhishTank. What is Phishing? http://www.phishtank.com/what_is_phishing

  19. Wikepedia. Accuracy and Precision. https://en.wikipedia.org/wiki/Accuracy_and_precision

  20. Shaikh, J.S.: Facebook Phishing, 15 August 2015. https://linuxworkgroup.wordpress.com/2015/08/25/facebook-phishing/

  21. Abdelhamid, N.: Multi-label rules for phishing classification. Appl. Comput. Inform. 11(1), 29–46 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharvari Prakash Chorghe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Chorghe, S.P., Shekokar, N. (2016). A Solution to Detect Phishing in Android Devices. In: Ray, I., Gaur, M., Conti, M., Sanghi, D., Kamakoti, V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science(), vol 10063. Springer, Cham. https://doi.org/10.1007/978-3-319-49806-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49806-5_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49805-8

  • Online ISBN: 978-3-319-49806-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics