Research Article

A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection

Table 1

Legitimate behaviors and their respective phishing attack techniques.

ā€‰Legitimate behaviorRespective attack techniques

Mobile senderSocial sharing, upgrades, game credits, opening a target in the browser, send user to embedded http page in browser that links to https loginFake mobile login screen, task interception, scheme squatting, keylogging, URL bar hiding/spoofing, fake browser, using active network attack plus URL bar spoofing.
Web senderLink to mobile e-mail or Twitter, payment via PayPal or Google checkout and user follows link from http to httpsWebsite spoofs mobile app, task interception, scheme squatting, URL bar hiding/spoofing, active network attack plus URL bar spoofing.