April 2024
·
29 Reads
·
3 Citations
Information Security Journal A Global Perspective
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
April 2024
·
29 Reads
·
3 Citations
Information Security Journal A Global Perspective
August 2022
·
243 Reads
·
15 Citations
Wireless Personal Communications
Nowadays, the growth of mobile phones users has gained a significant increase because of the features offered by them in abundant amounts. These devices are being used rapidly for accessing the web and many online services. However, the security mechanisms that are available in smartphones are not yet mature. Therefore, smartphones are vulnerable to various types of attacks, such as phishing. The browsers on smartphones are very trivial and the smartphones security abilities have been lessened, to match the smartphone's capabilities. Therefore, detection of the malicious website is different from the previously known technique, which is used on the desktop. Many anti-phishing techniques for mobile devices have been developed but still, there is a lack of a full-fledged solution. Therefore, this paper presents an efficient approach to detect malicious mobile webpages. The proposed approach APuML (Anti Phishing using Machine Learning) extracts all the static and site popularity features from the given URL to create a feature vector. An appropriate machine learning classification algorithm is then applied on the feature set to obtain the result and update the database accordingly. In our approach, the Random Forest classifier outperforms over other classifiers and achieved detection accuracy of 93.85%. We have also created an endpoint application for the users to interact with our system using his/her mobile devices. Moreover, the proposed approach can identify drive-by downloads attack, zero-day attack and clickjacking attack with high accuracy.
August 2021
·
57 Reads
Nowadays, the growth of mobile phones users has gained a significant increase because of the features offered by them in abundant amounts. These devices are being used rapidly for accessing the web and many online services. However, the security mechanisms that are available in smartphones are not yet mature. Therefore, smartphones are vulnerable to various types of attacks, such as phishing. The browsers on smartphones are very trivial and the smartphones security abilities have been lessened, to match the smartphone's capabilities. Therefore, detection of the malicious website is different from the previously known technique, which is used on the desktop. Many anti-phishing techniques for mobile devices have been developed but still, there is a lack of a full-fledged solution. Therefore, this paper presents an efficient approach to detect malicious mobile webpages. The proposed approach APuML (Anti Phishing using Machine Learning) extracts all the static and site popularity features from the given URL to create a feature vector. An appropriate machine learning classification algorithm is then applied on the feature set to obtain the result and update the database accordingly. In our approach, the Random Forest classifier outperforms over other classifiers and achieved detection accuracy of 93.85 %. We have also created an endpoint application for the users to interact with our system using his/her mobile devices. Moreover, the proposed approach can identify drive-by downloads attack, zero-day attack and clickjacking attack with high accuracy.
... These apps are convenient for use on the go and differ from desktop applications, which are meant for traditional computers. In contrast, web applications operate through mobile web browsers rather than being installed directly on the device (Alotaibi et al., 2024;Debnath & Jain, 2024). • Mobile connectivity: Mobile connectivity refers to the ability of devices to connect to networks and communicate with one another. ...
April 2024
Information Security Journal A Global Perspective
... Hence, we chose to remove them from the relative comparison table as more research work where various machine learning algorithms are used to detect drive-by download attack are still required. We don't know why the detection of drive-by download attacks using machine learning algorithms is so scanty, and so this is open for [1], [81], [26], [12], [83], [55] 88.69 Naive Bayes [56], [1], [47], [103], [77], [92] 87.37 Random Forest [1], [12], [83], [55], [77], [23] 91.83 Decision Tree [1], [40], [60], [55], [103], [34] 91.85 KNN [81], [55], [103], [77], [92], [74] 92.22 Logistic Regression [81], [55], [77], [34], [27], [109] 92 .76 investigation and further research. ...
August 2022
Wireless Personal Communications