Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/12356
Title: A Review of Detection Methodologies for Quick Response code Phishing Attacks
Authors: Sikiru, Subairu
John, Alhassan
Abdulhamid, Shafi’i Muhammad
Ojeniyi, Joseph
Keywords: phishing attack
quick Response Code
password
Issue Date: 2-Mar-2020
Publisher: 2020 International Conference on Computer and Information Sciences (ICCIS), IEEE Conference, Jouf University, Aljouf
Citation: 10.1109/ICCIS49240.2020.9257687
Abstract: Recently, phishing attacks have taking a new dimension with the addition of quick response code to phishing attacks vectors. Quick response code phishing attack is when an attacker lures its victims to voluntarily divulge personal information such as password, personal identification number, username and other information such as online banking details through the use of quick response code. This attack is on the rise as more and more people have adopted mobile phone usage not just for communication only but to perform transaction seamlessly. The ease of creation and use of quick response code has made it easily acceptable to both provider of goods and services and consumers. This attack is semantic as it exploits human vulnerabilities; as users can hardly know what is hidden in the quick response code before usage. This study reviewed various methodologies that earlier researcher have used to detect this semantic-based attack of phishing. The strength of each methodology, its weakness and general research gaps identified.
URI: DOI: 10.1109/ICCIS49240.2020.9257687
http://repository.futminna.edu.ng:8080/jspui/handle/123456789/12356
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
5.pdfA Review of Detection Methodologies for Quick Response code Phishing Attacks220.11 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.