Cargando…
DSmishSMS-A System to Detect Smishing SMS
With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer London
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318556/ https://www.ncbi.nlm.nih.gov/pubmed/34341626 http://dx.doi.org/10.1007/s00521-021-06305-y |
_version_ | 1783730266339016704 |
---|---|
author | Mishra, Sandhya Soni, Devpriya |
author_facet | Mishra, Sandhya Soni, Devpriya |
author_sort | Mishra, Sandhya |
collection | PubMed |
description | With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such as desktops or laptops. Text messages or SMS (Short Text Messages) are a part of smartphones through which attackers target the users. Smishing (SMS Phishing) is an attack targeting smartphone users through the medium of text messages. Though smishing is a type of phishing, it is different from phishing in many aspects like the amount of information available in the SMS, the strategy of attack, etc. Thus, detection of smishing is a challenge in the context of the minimum amount of information shared by the attacker. In the case of smishing, we have short text messages which are often in short forms or in symbolic forms. A single text message contains very few smishing-related features, and it consists of abbreviations and idioms which makes smishing detection more difficult. Detection of smishing is a challenge not only because of features constraint but also due to the scarcity of real smishing datasets. To differentiate spam messages from smishing messages, we are evaluating the legitimacy of the URL (Uniform Resource Locator) in the message. We have extracted the five most efficient features from the text messages to enable the machine learning classification using a limited number of features. In this paper, we have presented a smishing detection model comprising of two phases, Domain Checking Phase and SMS Classification Phase. We have examined the authenticity of the URL in the SMS which is a crucial part of SMS phishing detection. In our system, Domain Checking Phase scrutinizes the authenticity of the URL. SMS Classification Phase examines the text contents of the messages and extracts some efficient features. Finally, the system classifies the messages using Backpropagation Algorithm and compares results with three traditional classifiers. A prototype of the system has been developed and evaluated using SMS datasets. The results of the evaluation achieved an accuracy of 97.93% which shows the proposed method is very efficient for the detection of smishing messages. |
format | Online Article Text |
id | pubmed-8318556 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer London |
record_format | MEDLINE/PubMed |
spelling | pubmed-83185562021-07-29 DSmishSMS-A System to Detect Smishing SMS Mishra, Sandhya Soni, Devpriya Neural Comput Appl S.I. : Machine Learning Applications for Security With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such as desktops or laptops. Text messages or SMS (Short Text Messages) are a part of smartphones through which attackers target the users. Smishing (SMS Phishing) is an attack targeting smartphone users through the medium of text messages. Though smishing is a type of phishing, it is different from phishing in many aspects like the amount of information available in the SMS, the strategy of attack, etc. Thus, detection of smishing is a challenge in the context of the minimum amount of information shared by the attacker. In the case of smishing, we have short text messages which are often in short forms or in symbolic forms. A single text message contains very few smishing-related features, and it consists of abbreviations and idioms which makes smishing detection more difficult. Detection of smishing is a challenge not only because of features constraint but also due to the scarcity of real smishing datasets. To differentiate spam messages from smishing messages, we are evaluating the legitimacy of the URL (Uniform Resource Locator) in the message. We have extracted the five most efficient features from the text messages to enable the machine learning classification using a limited number of features. In this paper, we have presented a smishing detection model comprising of two phases, Domain Checking Phase and SMS Classification Phase. We have examined the authenticity of the URL in the SMS which is a crucial part of SMS phishing detection. In our system, Domain Checking Phase scrutinizes the authenticity of the URL. SMS Classification Phase examines the text contents of the messages and extracts some efficient features. Finally, the system classifies the messages using Backpropagation Algorithm and compares results with three traditional classifiers. A prototype of the system has been developed and evaluated using SMS datasets. The results of the evaluation achieved an accuracy of 97.93% which shows the proposed method is very efficient for the detection of smishing messages. Springer London 2021-07-28 2023 /pmc/articles/PMC8318556/ /pubmed/34341626 http://dx.doi.org/10.1007/s00521-021-06305-y Text en © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | S.I. : Machine Learning Applications for Security Mishra, Sandhya Soni, Devpriya DSmishSMS-A System to Detect Smishing SMS |
title | DSmishSMS-A System to Detect Smishing SMS |
title_full | DSmishSMS-A System to Detect Smishing SMS |
title_fullStr | DSmishSMS-A System to Detect Smishing SMS |
title_full_unstemmed | DSmishSMS-A System to Detect Smishing SMS |
title_short | DSmishSMS-A System to Detect Smishing SMS |
title_sort | dsmishsms-a system to detect smishing sms |
topic | S.I. : Machine Learning Applications for Security |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318556/ https://www.ncbi.nlm.nih.gov/pubmed/34341626 http://dx.doi.org/10.1007/s00521-021-06305-y |
work_keys_str_mv | AT mishrasandhya dsmishsmsasystemtodetectsmishingsms AT sonidevpriya dsmishsmsasystemtodetectsmishingsms |