CFP last date
20 May 2024
Reseach Article

Preliminary Review of Phishing Attacks and Countermeasures on the Internet of Things (IoT) Environment

by Nor Naematul Saadah Ismail, Mohamad Fadli Zolkipli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 52
Year of Publication: 2023
Authors: Nor Naematul Saadah Ismail, Mohamad Fadli Zolkipli
10.5120/ijca2023922651

Nor Naematul Saadah Ismail, Mohamad Fadli Zolkipli . Preliminary Review of Phishing Attacks and Countermeasures on the Internet of Things (IoT) Environment. International Journal of Computer Applications. 184, 52 ( Mar 2023), 50-54. DOI=10.5120/ijca2023922651

@article{ 10.5120/ijca2023922651,
author = { Nor Naematul Saadah Ismail, Mohamad Fadli Zolkipli },
title = { Preliminary Review of Phishing Attacks and Countermeasures on the Internet of Things (IoT) Environment },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2023 },
volume = { 184 },
number = { 52 },
month = { Mar },
year = { 2023 },
issn = { 0975-8887 },
pages = { 50-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number52/32663-2023922651/ },
doi = { 10.5120/ijca2023922651 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:44.853422+05:30
%A Nor Naematul Saadah Ismail
%A Mohamad Fadli Zolkipli
%T Preliminary Review of Phishing Attacks and Countermeasures on the Internet of Things (IoT) Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 52
%P 50-54
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cybercriminals now have a perfect target thanks to the growing popularity of the Internet of Things (IoT), which has increased the number of gadgets connected to the internet. In conjunction with the usage of Internet Protocol version 6 (IPv6), every device can get connected to the Internet. With this tremendous usage of devices along with Internet connection, one of the most prevalent forms of cyberattacks that target IoT devices is the phishing attack, which aims to gain owner’s privileges and can make data loss. This study offers a basic analysis of phishing attacks and defenses in the context of the Internet of Things. It discusses the fundamental ideas behind phishing assaults, their types, and characteristics, as well as the most recent trends and methods that cybercriminals are using to carry out these attacks. It also examines the current countermeasures for phishing attacks on IoT devices. This paper summarizes the present state of knowledge regarding phishing attacks in the IoT environment and emphasizes the need for establishing strong defenses against these attacks for IoT devices.

References
  1. A. Dunkels et al., “Low-power IPv6 for the internet of things,” 9th Int. Conf. Networked Sens. Syst. INSS 2012 - Conf. Proc., 2012.
  2. S. A. Haifa Ali and J. Vakula Rani, “Attack Detection in IoT Using Machine Learning—A Survey BT - Intelligent Cyber Physical Systems and Internet of Things,” 2023, pp. 211–228.
  3. T. Aziz and E. Haq, “Security Challenges Facing IoT Layers and its Protective Measures,” Int. J. Comput. Appl., vol. 179, no. 27, pp. 31–35, 2018.
  4. H. Thakur and S. Kaur, “A Survey Paper On Phishing Detection,” Int. J. Adv. Res. Comput. Sci., vol. 7, no. 4, pp. 64–69, 2016.
  5. K. Nirmal, B. Janet, and R. Kumar, “Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection,” Peer-to-Peer Netw. Appl., vol. 14, no. 4, pp. 2327–2339, 2021.
  6. Ani Petrosyan, “Online industries most targeted by phishing attacks,” 2022. [Online]. Available: https://www.statista.com/statistics/266161/websites-most-affected-by-phishing/.
  7. A. Sadiq et al., “A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0,” Hum. Behav. Emerg. Technol., vol. 3, no. 5, pp. 854–864, Dec. 2021.
  8. S. Gautam, A. Malik, N. Singh, and S. Kumar, “Recent Advances and Countermeasures against Various Attacks in IoT Environment,” 2nd Int. Conf. Signal Process. Commun. ICSPC 2019 - Proc., pp. 315–319, 2019.
  9. P. Gokhale, O. Bhat, and S. Bhat, “Introduction to IoT,” Int. Adv. Res. J. Sci. Eng. Technol., vol. 5, no. 1, pp. 41–44, 2018.
  10. S. G. Abbas et al., “Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach,” Sensors, vol. 21, no. 14, pp. 1–25, 2021.
  11. K. Nirmal, B. Janet, and R. Kumar, “Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection,” Peer-to-Peer Netw. Appl., vol. 14, no. 4, pp. 2327–2339, 2021.
  12. S. Naaz, “Detection of phishing in internet of things using machine learning approach,” Int. J. Digit. Crime Forensics, vol. 13, no. 2, pp. 1–15, 2021.
  13. L. Bustio-Martínez, M. A. Álvarez-Carmona, V. Herrera-Semenets, C. Feregrino-Uribe, and R. Cumplido, “A lightweight data representation for phishing URLs detection in IoT environments,” Inf. Sci. (Ny)., vol. 603, pp. 42–59, 2022.
  14. R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,” Futur. Internet, vol. 12, no. 10, pp. 1–39, 2020.
  15. B. B. Gupta, N. A. G. Arachchilage, and K. E. Psannis, “Defending against phishing attacks: taxonomy of methods, current issues and future directions,” Telecommun. Syst., pp. 1–32, 2017.
  16. H. Aldawood and G. Skinner, “Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues,” Future Internet, vol. 11, no. 3. MDPI AG, 2019.
  17. K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures,” IoT, vol. 2, no. 1, pp. 163–186, 2021.
  18. Y. Meng, W. Zhang, H. Zhu, and X. S. Shen, “Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures,” IEEE Wirel. Commun., vol. 25, no. 6, pp. 53–59, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT) Phishing Attack