PHISHPIN: AN INTEGRATED, IDENTITY-BASED ANTI-PHISHING APPROACH

被引:0
|
作者
Tout, Hicham [1 ]
机构
[1] Nova SE Univ, Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
关键词
Phishing; Spam; Information security; Identity theft; Social engineering; Encryption; Hash algorithms; One time password; Digital certificates; Online scams; Web; Pharming;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Phishing is a social engineering technique used to fraudulently acquire sensitive information from users by masquerading as a legitimate entity. One of the primary goals of phishing is to illegally carry fraudulent financial transactions on behalf of users. The two primary vulnerabilities exploited by phishers are: Inability of non-technical/unsophisticated users to always identify spoofed emails or Web sites; and the relative ease with which phishers masquerade as legitimate Web sites. This paper presents Phishpin, an approach that leverages the concepts of mutual authentication to require online entities to prove their identities. To this end, Phishpin builds on One-Time-Password, DNS, partial credentials sharing, & client filtering to prevent phishers from masquerading as legitimate online entities.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [21] Email Anti-Phishing Detection Application
    Helmi, Rabab Alayham Abbas
    Ren, Chua Shang
    Jamal, Arshad
    Abdullah, Muhammad Irsyad
    2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 264 - 267
  • [22] A framework for assessment of anti-phishing preparedness
    Leung, Alvin Chung Man
    Bose, Indranil
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1020 - +
  • [23] Analysis and improvement of anti-phishing schemes
    Florencio, Dinei
    Herley, Cormac
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 148 - +
  • [24] Anti-phishing by smart mobile device
    Han, Weili
    Wang, Yi
    Cao, Ye
    Zhou, Jiping
    Wang, Lixing
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 295 - 300
  • [25] Usability evaluation of anti-phishing toolbars
    Linfeng Li
    Marko Helenius
    Journal in Computer Virology, 2007, 3 (2): : 163 - 184
  • [26] Time Up for Phishing with Effective Anti-Phishing Research Strategies
    Chaudhary, Sunil
    Berki, Eleni
    Li, Linfeng
    Valtanen, Juri
    INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2015, 6 (02) : 49 - 64
  • [27] Mobile anti-phishing: Approaches and challenges
    Shahriar, Hossain
    Zhang, Chi
    Dunn, Stephen
    Bronte, Robert
    Sahlan, Atef
    Tarmissi, Khaled
    INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 178 - 193
  • [28] NoPhish: An anti-phishing education app
    Technische Universität Darmstadt, Germany
    Lect. Notes Comput. Sci., (188-192):
  • [29] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184
  • [30] Visual security is feeble for Anti-Phishing
    Leung, Chun-Ming
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123