Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
Descripción del Articulo
The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of...
Autores: | , , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2022 |
Institución: | Universidad Tecnológica del Perú |
Repositorio: | UTP-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/6516 |
Enlace del recurso: | https://hdl.handle.net/20.500.12867/6516 https://doi.org/10.17762/ijritcc.v10i10.5733 |
Nivel de acceso: | acceso abierto |
Materia: | Phishing Information security Mobile application https://purl.org/pe-repo/ocde/ford#1.02.02 |
Sumario: | The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of false information through the different social networks, in addition, the circulation with messages related to the cure of this disease only for the theft of data. This research develops a mobile application that detects malicious URLs found within the content of textmessages. The developed application performs an analysis of the URLs according to the database thatis updated with each attack detected, performing a blocking of the content and notifies the user of the actions that canbetaken, with this the theft of the personal data of the users is avoided. This application is very useful for all those people who use mobile equipment (mobile) and haveno knowledge of these types of attacks, since they are likely to perform the actions that the perpetrators foresee for the obtaining of their personal data, so this application provides a means of security against these types of phishing attacks. |
---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).