Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic
Descripción del Articulo
The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of...
Autores: | , , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2022 |
Institución: | Universidad Tecnológica del Perú |
Repositorio: | UTP-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/6516 |
Enlace del recurso: | https://hdl.handle.net/20.500.12867/6516 https://doi.org/10.17762/ijritcc.v10i10.5733 |
Nivel de acceso: | acceso abierto |
Materia: | Phishing Information security Mobile application https://purl.org/pe-repo/ocde/ford#1.02.02 |
id |
UTPD_877c06ad46ee5c9df498569dc9280c6e |
---|---|
oai_identifier_str |
oai:repositorio.utp.edu.pe:20.500.12867/6516 |
network_acronym_str |
UTPD |
network_name_str |
UTP-Institucional |
repository_id_str |
4782 |
dc.title.es_PE.fl_str_mv |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
title |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
spellingShingle |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic Meneses Claudio, Brian Andreé Phishing Information security Mobile application https://purl.org/pe-repo/ocde/ford#1.02.02 |
title_short |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
title_full |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
title_fullStr |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
title_full_unstemmed |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
title_sort |
Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemic |
author |
Meneses Claudio, Brian Andreé |
author_facet |
Meneses Claudio, Brian Andreé Lee Huamaní, Enrique Velarde-Molina, Jehovanni Fabricio Mirji, Hema Bhavsar, Dhananjay Narayan |
author_role |
author |
author2 |
Lee Huamaní, Enrique Velarde-Molina, Jehovanni Fabricio Mirji, Hema Bhavsar, Dhananjay Narayan |
author2_role |
author author author author |
dc.contributor.author.fl_str_mv |
Meneses Claudio, Brian Andreé Lee Huamaní, Enrique Velarde-Molina, Jehovanni Fabricio Mirji, Hema Bhavsar, Dhananjay Narayan |
dc.subject.es_PE.fl_str_mv |
Phishing Information security Mobile application |
topic |
Phishing Information security Mobile application https://purl.org/pe-repo/ocde/ford#1.02.02 |
dc.subject.ocde.es_PE.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#1.02.02 |
description |
The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of false information through the different social networks, in addition, the circulation with messages related to the cure of this disease only for the theft of data. This research develops a mobile application that detects malicious URLs found within the content of textmessages. The developed application performs an analysis of the URLs according to the database thatis updated with each attack detected, performing a blocking of the content and notifies the user of the actions that canbetaken, with this the theft of the personal data of the users is avoided. This application is very useful for all those people who use mobile equipment (mobile) and haveno knowledge of these types of attacks, since they are likely to perform the actions that the perpetrators foresee for the obtaining of their personal data, so this application provides a means of security against these types of phishing attacks. |
publishDate |
2022 |
dc.date.accessioned.none.fl_str_mv |
2023-01-25T01:56:07Z |
dc.date.available.none.fl_str_mv |
2023-01-25T01:56:07Z |
dc.date.issued.fl_str_mv |
2022 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2321-8169 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12867/6516 |
dc.identifier.journal.es_PE.fl_str_mv |
International Journal on Recent and Innovation Trends in Computing and Communication |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.17762/ijritcc.v10i10.5733 |
identifier_str_mv |
2321-8169 International Journal on Recent and Innovation Trends in Computing and Communication |
url |
https://hdl.handle.net/20.500.12867/6516 https://doi.org/10.17762/ijritcc.v10i10.5733 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.relation.ispartofseries.none.fl_str_mv |
International Journal on Recent and Innovation Trends in Computing and Communication;vol. 10, n° 10, pp. 45 - 51 |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.es_PE.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.format.es_PE.fl_str_mv |
application/pdf |
dc.publisher.es_PE.fl_str_mv |
Auricle Global Society of Education and Research |
dc.publisher.country.es_PE.fl_str_mv |
IN |
dc.source.es_PE.fl_str_mv |
Repositorio Institucional - UTP Universidad Tecnológica del Perú |
dc.source.none.fl_str_mv |
reponame:UTP-Institucional instname:Universidad Tecnológica del Perú instacron:UTP |
instname_str |
Universidad Tecnológica del Perú |
instacron_str |
UTP |
institution |
UTP |
reponame_str |
UTP-Institucional |
collection |
UTP-Institucional |
bitstream.url.fl_str_mv |
http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/2/license.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/1/B.Meneses_IJRITCC_Articulo_eng_2022.pdf http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/3/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/4/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpg |
bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 118cbc7cf54903fd7ea240157b18ae0f 411758659ef69dfd4f6b649046bdb11f 4cc69d09bb0c8a4a34a06e42e7d71288 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad Tecnológica del Perú |
repository.mail.fl_str_mv |
repositorio@utp.edu.pe |
_version_ |
1817984834235006976 |
spelling |
Meneses Claudio, Brian AndreéLee Huamaní, EnriqueVelarde-Molina, Jehovanni FabricioMirji, HemaBhavsar, Dhananjay Narayan2023-01-25T01:56:07Z2023-01-25T01:56:07Z20222321-8169https://hdl.handle.net/20.500.12867/6516International Journal on Recent and Innovation Trends in Computing and Communicationhttps://doi.org/10.17762/ijritcc.v10i10.5733The COVID-19 pandemic has established not only a health emergency, but has generated an emergency in the control of personal data of all those people who make use of technological means, which increased the activity of phishing which consists of the theft of personal data through the circulation of false information through the different social networks, in addition, the circulation with messages related to the cure of this disease only for the theft of data. This research develops a mobile application that detects malicious URLs found within the content of textmessages. The developed application performs an analysis of the URLs according to the database thatis updated with each attack detected, performing a blocking of the content and notifies the user of the actions that canbetaken, with this the theft of the personal data of the users is avoided. This application is very useful for all those people who use mobile equipment (mobile) and haveno knowledge of these types of attacks, since they are likely to perform the actions that the perpetrators foresee for the obtaining of their personal data, so this application provides a means of security against these types of phishing attacks.Campus Lima Norteapplication/pdfengAuricle Global Society of Education and ResearchINInternational Journal on Recent and Innovation Trends in Computing and Communication;vol. 10, n° 10, pp. 45 - 51info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-nd/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPPhishingInformation securityMobile applicationhttps://purl.org/pe-repo/ocde/ford#1.02.02Development of mobile application that detects phishing Messages to decrease the percentage of data theft during the COVID-19 pandemicinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionLICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52ORIGINALB.Meneses_IJRITCC_Articulo_eng_2022.pdfB.Meneses_IJRITCC_Articulo_eng_2022.pdfapplication/pdf428386http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/1/B.Meneses_IJRITCC_Articulo_eng_2022.pdf118cbc7cf54903fd7ea240157b18ae0fMD51TEXTB.Meneses_IJRITCC_Articulo_eng_2022.pdf.txtB.Meneses_IJRITCC_Articulo_eng_2022.pdf.txtExtracted texttext/plain27800http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/3/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.txt411758659ef69dfd4f6b649046bdb11fMD53THUMBNAILB.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpgB.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpgGenerated Thumbnailimage/jpeg27730http://repositorio.utp.edu.pe/bitstream/20.500.12867/6516/4/B.Meneses_IJRITCC_Articulo_eng_2022.pdf.jpg4cc69d09bb0c8a4a34a06e42e7d71288MD5420.500.12867/6516oai:repositorio.utp.edu.pe:20.500.12867/65162023-01-25 11:03:26.379Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.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 |
score |
13.949927 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).