Cargando…

DSmishSMS-A System to Detect Smishing SMS

With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such...

Descripción completa

Detalles Bibliográficos
Autores principales: Mishra, Sandhya, Soni, Devpriya
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer London 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318556/
https://www.ncbi.nlm.nih.gov/pubmed/34341626
http://dx.doi.org/10.1007/s00521-021-06305-y
_version_ 1783730266339016704
author Mishra, Sandhya
Soni, Devpriya
author_facet Mishra, Sandhya
Soni, Devpriya
author_sort Mishra, Sandhya
collection PubMed
description With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such as desktops or laptops. Text messages or SMS (Short Text Messages) are a part of smartphones through which attackers target the users. Smishing (SMS Phishing) is an attack targeting smartphone users through the medium of text messages. Though smishing is a type of phishing, it is different from phishing in many aspects like the amount of information available in the SMS, the strategy of attack, etc. Thus, detection of smishing is a challenge in the context of the minimum amount of information shared by the attacker. In the case of smishing, we have short text messages which are often in short forms or in symbolic forms. A single text message contains very few smishing-related features, and it consists of abbreviations and idioms which makes smishing detection more difficult. Detection of smishing is a challenge not only because of features constraint but also due to the scarcity of real smishing datasets. To differentiate spam messages from smishing messages, we are evaluating the legitimacy of the URL (Uniform Resource Locator) in the message. We have extracted the five most efficient features from the text messages to enable the machine learning classification using a limited number of features. In this paper, we have presented a smishing detection model comprising of two phases, Domain Checking Phase and SMS Classification Phase. We have examined the authenticity of the URL in the SMS which is a crucial part of SMS phishing detection. In our system, Domain Checking Phase scrutinizes the authenticity of the URL. SMS Classification Phase examines the text contents of the messages and extracts some efficient features. Finally, the system classifies the messages using Backpropagation Algorithm and compares results with three traditional classifiers. A prototype of the system has been developed and evaluated using SMS datasets. The results of the evaluation achieved an accuracy of 97.93% which shows the proposed method is very efficient for the detection of smishing messages.
format Online
Article
Text
id pubmed-8318556
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer London
record_format MEDLINE/PubMed
spelling pubmed-83185562021-07-29 DSmishSMS-A System to Detect Smishing SMS Mishra, Sandhya Soni, Devpriya Neural Comput Appl S.I. : Machine Learning Applications for Security With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such as desktops or laptops. Text messages or SMS (Short Text Messages) are a part of smartphones through which attackers target the users. Smishing (SMS Phishing) is an attack targeting smartphone users through the medium of text messages. Though smishing is a type of phishing, it is different from phishing in many aspects like the amount of information available in the SMS, the strategy of attack, etc. Thus, detection of smishing is a challenge in the context of the minimum amount of information shared by the attacker. In the case of smishing, we have short text messages which are often in short forms or in symbolic forms. A single text message contains very few smishing-related features, and it consists of abbreviations and idioms which makes smishing detection more difficult. Detection of smishing is a challenge not only because of features constraint but also due to the scarcity of real smishing datasets. To differentiate spam messages from smishing messages, we are evaluating the legitimacy of the URL (Uniform Resource Locator) in the message. We have extracted the five most efficient features from the text messages to enable the machine learning classification using a limited number of features. In this paper, we have presented a smishing detection model comprising of two phases, Domain Checking Phase and SMS Classification Phase. We have examined the authenticity of the URL in the SMS which is a crucial part of SMS phishing detection. In our system, Domain Checking Phase scrutinizes the authenticity of the URL. SMS Classification Phase examines the text contents of the messages and extracts some efficient features. Finally, the system classifies the messages using Backpropagation Algorithm and compares results with three traditional classifiers. A prototype of the system has been developed and evaluated using SMS datasets. The results of the evaluation achieved an accuracy of 97.93% which shows the proposed method is very efficient for the detection of smishing messages. Springer London 2021-07-28 2023 /pmc/articles/PMC8318556/ /pubmed/34341626 http://dx.doi.org/10.1007/s00521-021-06305-y Text en © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle S.I. : Machine Learning Applications for Security
Mishra, Sandhya
Soni, Devpriya
DSmishSMS-A System to Detect Smishing SMS
title DSmishSMS-A System to Detect Smishing SMS
title_full DSmishSMS-A System to Detect Smishing SMS
title_fullStr DSmishSMS-A System to Detect Smishing SMS
title_full_unstemmed DSmishSMS-A System to Detect Smishing SMS
title_short DSmishSMS-A System to Detect Smishing SMS
title_sort dsmishsms-a system to detect smishing sms
topic S.I. : Machine Learning Applications for Security
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318556/
https://www.ncbi.nlm.nih.gov/pubmed/34341626
http://dx.doi.org/10.1007/s00521-021-06305-y
work_keys_str_mv AT mishrasandhya dsmishsmsasystemtodetectsmishingsms
AT sonidevpriya dsmishsmsasystemtodetectsmishingsms