A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
Table 1
Legitimate behaviors and their respective phishing attack techniques.
ā
Legitimate behavior
Respective attack techniques
Mobile sender
Social sharing, upgrades, game credits, opening a target in the browser, send user to embedded http page in browser that links to https login
Fake mobile login screen, task interception, scheme squatting, keylogging, URL bar hiding/spoofing, fake browser, using active network attack plus URL bar spoofing.
Web sender
Link to mobile e-mail or Twitter, payment via PayPal or Google checkout and user follows link from http to https
Website spoofs mobile app, task interception, scheme squatting, URL bar hiding/spoofing, active network attack plus URL bar spoofing.