Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11692
Title: | A Review of Detection Methodologies for Quick Response code Phishing Attacks |
Authors: | Subairu, S.O Alhassan, J.K Abdulhamid, S.M Ojeniyi, J.A |
Keywords: | phishing attack , password , quick Response Code , username |
Issue Date: | 24-Nov-2020 |
Publisher: | IEEE |
Citation: | S. Subairu, J. Alhassan, S. Abdulhamid and J. Ojeniyi, "A Review of Detection Methodologies for Quick Response code Phishing Attacks," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-5, doi: 10.1109/ICCIS49240.2020.9257687. |
Abstract: | Recently, phishing attacks have taking a new dimension with the addition of quick response code to phishing attacks vectors. Quick response code phishing attack is when an attacker lures its victims to voluntarily divulge personal information such as password, personal identification number, username and other information such as online banking details through the use of quick response code. This attack is on the rise as more and more people have adopted mobile phone usage not just for communication only but to perform transaction seamlessly. The ease of creation and use of quick response code has made it easily acceptable to both provider of goods and services and consumers. This attack is semantic as it exploits human vulnerabilities; as users can hardly know what is hidden in the quick response code before usage. This study reviewed various methodologies that earlier researcher have used to detect this semantic-based attack of phishing. The strength of each methodology, its weakness and general research gaps identified. |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11692 |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A Review of Detection Methodologies for Quick Response code Phishing Attacks _ IEEE Conference Publication _ IEEE Xplore.pdf | 96.44 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.