Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic

Descripción del Articulo

The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of...

Descripción completa

Detalles Bibliográficos
Autores: Meneses Claudio, Brian Andreé, Lee Huamaní, Enrique, Velarde-Molina, Jehovanni Fabricio, Mirji, Hema, Bhavsar, Dhananjay Narayan
Formato: artículo
Fecha de Publicación:2022
Institución:Universidad Tecnológica del Perú
Repositorio:UTP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.utp.edu.pe:20.500.12867/6516
Enlace del recurso:https://hdl.handle.net/20.500.12867/6516
https://doi.org/10.17762/ijritcc.v10i10.5733
Nivel de acceso:acceso abierto
Materia:Phishing
Information security
Mobile application
https://purl.org/pe-repo/ocde/ford#1.02.02
id UTPD_877c06ad46ee5c9df498569dc9280c6e
oai_identifier_str oai:repositorio.utp.edu.pe:20.500.12867/6516
network_acronym_str UTPD
network_name_str UTP-Institucional
repository_id_str 4782
dc.title.es_PE.fl_str_mv Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
title Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
spellingShingle Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
Meneses Claudio, Brian Andreé
Phishing
Information security
Mobile application
https://purl.org/pe-repo/ocde/ford#1.02.02
title_short Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
title_full Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
title_fullStr Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
title_full_unstemmed Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
title_sort Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
author Meneses Claudio, Brian Andreé
author_facet Meneses Claudio, Brian Andreé
Lee Huamaní, Enrique
Velarde-Molina, Jehovanni Fabricio
Mirji, Hema
Bhavsar, Dhananjay Narayan
author_role author
author2 Lee Huamaní, Enrique
Velarde-Molina, Jehovanni Fabricio
Mirji, Hema
Bhavsar, Dhananjay Narayan
author2_role author
author
author
author
dc.contributor.author.fl_str_mv Meneses Claudio, Brian Andreé
Lee Huamaní, Enrique
Velarde-Molina, Jehovanni Fabricio
Mirji, Hema
Bhavsar, Dhananjay Narayan
dc.subject.es_PE.fl_str_mv Phishing
Information security
Mobile application
topic Phishing
Information security
Mobile application
https://purl.org/pe-repo/ocde/ford#1.02.02
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#1.02.02
description The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of false information through the different social networks, in addition, the circulation with messages related to the cure of this disease only for the theft of data. This research develops a mobile application that detects malicious URLs found within the content of textmessages. The developed application performs an analysis of the URLs according to the database thatis updated with each attack detected, performing a blocking of the content and notifies the user of the actions that canbetaken, with this the theft of the personal data of the users is avoided. This application is very useful for all those people who use mobile equipment (mobile) and haveno knowledge of these types of attacks, since they are likely to perform the actions that the perpetrators foresee for the obtaining of their personal data, so this application provides a means of security against these types of phishing attacks.
publishDate 2022
dc.date.accessioned.none.fl_str_mv 2023-01-25T01:56:07Z
dc.date.available.none.fl_str_mv 2023-01-25T01:56:07Z
dc.date.issued.fl_str_mv 2022
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2321-8169
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12867/6516
dc.identifier.journal.es_PE.fl_str_mv International Journal on Recent and Innovation Trends in Computing and Communication
dc.identifier.doi.none.fl_str_mv https://doi.org/10.17762/ijritcc.v10i10.5733
identifier_str_mv 2321-8169
International Journal on Recent and Innovation Trends in Computing and Communication
url https://hdl.handle.net/20.500.12867/6516
https://doi.org/10.17762/ijritcc.v10i10.5733
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.relation.ispartofseries.none.fl_str_mv International Journal on Recent and Innovation Trends in Computing and Communication;vol. 10, n° 10, pp. 45 - 51
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Auricle Global Society of Education and Research
dc.publisher.country.es_PE.fl_str_mv IN
dc.source.es_PE.fl_str_mv Repositorio Institucional - UTP
Universidad Tecnológica del Perú
dc.source.none.fl_str_mv reponame:UTP-Institucional
instname:Universidad Tecnológica del Perú
instacron:UTP
instname_str Universidad Tecnológica del Perú
instacron_str UTP
institution UTP
reponame_str UTP-Institucional
collection UTP-Institucional
bitstream.url.fl_str_mv http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/2/license.txt
http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/1/B.Meneses_IJRITCC_Articulo_eng_2022.pdf
http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/3/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.txt
http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/4/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpg
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
118cbc7cf54903fd7ea240157b18ae0f
411758659ef69dfd4f6b649046bdb11f
4cc69d09bb0c8a4a34a06e42e7d71288
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad Tecnológica del Perú
repository.mail.fl_str_mv repositorio@utp.edu.pe
_version_ 1817984834235006976
spelling Meneses Claudio, Brian AndreéLee Huamaní, EnriqueVelarde-Molina, Jehovanni FabricioMirji, HemaBhavsar, Dhananjay Narayan2023-01-25T01:56:07Z2023-01-25T01:56:07Z20222321-8169https://hdl.handle.net/20.500.12867/6516International Journal on Recent and Innovation Trends in Computing and Communicationhttps://doi.org/10.17762/ijritcc.v10i10.5733The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of false information through the different social networks, in addition, the circulation with messages related to the cure of this disease only for the theft of data. This research develops a mobile application that detects malicious URLs found within the content of textmessages. The developed application performs an analysis of the URLs according to the database thatis updated with each attack detected, performing a blocking of the content and notifies the user of the actions that canbetaken, with this the theft of the personal data of the users is avoided. This application is very useful for all those people who use mobile equipment (mobile) and haveno knowledge of these types of attacks, since they are likely to perform the actions that the perpetrators foresee for the obtaining of their personal data, so this application provides a means of security against these types of phishing attacks.Campus Lima Norteapplication/pdfengAuricle Global Society of Education and ResearchINInternational Journal on Recent and Innovation Trends in Computing and Communication;vol. 10, n° 10, pp. 45 - 51info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-nd/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPPhishingInformation securityMobile applicationhttps://purl.org/pe-repo/ocde/ford#1.02.02Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemicinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionLICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52ORIGINALB.Meneses_IJRITCC_Articulo_eng_2022.pdfB.Meneses_IJRITCC_Articulo_eng_2022.pdfapplication/pdf428386http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/1/B.Meneses_IJRITCC_Articulo_eng_2022.pdf118cbc7cf54903fd7ea240157b18ae0fMD51TEXTB.Meneses_IJRITCC_Articulo_eng_2022.pdf.txtB.Meneses_IJRITCC_Articulo_eng_2022.pdf.txtExtracted texttext/plain27800http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/3/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.txt411758659ef69dfd4f6b649046bdb11fMD53THUMBNAILB.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpgB.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpgGenerated Thumbnailimage/jpeg27730http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/4/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpg4cc69d09bb0c8a4a34a06e42e7d71288MD5420.500.12867/6516oai:repositorio.utp.edu.pe:20.500.12867/65162023-01-25 11:03:26.379Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.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
score 13.949927
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).