Mosiur Rahaman , Nicko Cajes , Brij B. Gupta , Kwok Tai Chui , Nadia Nedjah
{"title":"防范诈骗攻击:最新技术、挑战、限制和未来发展方向","authors":"Mosiur Rahaman , Nicko Cajes , Brij B. Gupta , Kwok Tai Chui , Nadia Nedjah","doi":"10.1016/j.comnet.2025.111758","DOIUrl":null,"url":null,"abstract":"<div><div>Smishing is a hostile operation by attackers to get sensitive information using misrepresentation. Because autonomous anti-phishing systems are not very accurate, they may miss smishing crimes that are facilitated by thoughtful phishing SMS, or short message Smishing attacks have become more common over the past few years because of the widespread adoption of these user-friendly and useful devices. The goal of this literature review is to investigate the approaches and strategies employed in smishing attacks by utilizing categorization methods. This article outlines the current systems that employ deep learning and machine learning methods, along with their advantages, disadvantages, and restrictions. To effectively prevent spam messages rather than detect them, this study discusses the potential for future advancements in processing natural languages. We figured out about psychological issues, argumentation and need, bias against confirmation, and ignorance, among other smishing-related insights, problems, and future research directions. These findings suggest that understanding the cognitive process and its workings is essential to developing solutions for smishing attack detection and mitigation.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"273 ","pages":"Article 111758"},"PeriodicalIF":4.6000,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Defending against smishing attacks: State-of-the-art techniques, challenges, limitations, and future directions\",\"authors\":\"Mosiur Rahaman , Nicko Cajes , Brij B. Gupta , Kwok Tai Chui , Nadia Nedjah\",\"doi\":\"10.1016/j.comnet.2025.111758\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Smishing is a hostile operation by attackers to get sensitive information using misrepresentation. Because autonomous anti-phishing systems are not very accurate, they may miss smishing crimes that are facilitated by thoughtful phishing SMS, or short message Smishing attacks have become more common over the past few years because of the widespread adoption of these user-friendly and useful devices. The goal of this literature review is to investigate the approaches and strategies employed in smishing attacks by utilizing categorization methods. This article outlines the current systems that employ deep learning and machine learning methods, along with their advantages, disadvantages, and restrictions. To effectively prevent spam messages rather than detect them, this study discusses the potential for future advancements in processing natural languages. We figured out about psychological issues, argumentation and need, bias against confirmation, and ignorance, among other smishing-related insights, problems, and future research directions. These findings suggest that understanding the cognitive process and its workings is essential to developing solutions for smishing attack detection and mitigation.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"273 \",\"pages\":\"Article 111758\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625007248\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625007248","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Defending against smishing attacks: State-of-the-art techniques, challenges, limitations, and future directions
Smishing is a hostile operation by attackers to get sensitive information using misrepresentation. Because autonomous anti-phishing systems are not very accurate, they may miss smishing crimes that are facilitated by thoughtful phishing SMS, or short message Smishing attacks have become more common over the past few years because of the widespread adoption of these user-friendly and useful devices. The goal of this literature review is to investigate the approaches and strategies employed in smishing attacks by utilizing categorization methods. This article outlines the current systems that employ deep learning and machine learning methods, along with their advantages, disadvantages, and restrictions. To effectively prevent spam messages rather than detect them, this study discusses the potential for future advancements in processing natural languages. We figured out about psychological issues, argumentation and need, bias against confirmation, and ignorance, among other smishing-related insights, problems, and future research directions. These findings suggest that understanding the cognitive process and its workings is essential to developing solutions for smishing attack detection and mitigation.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.