Protection Mechanisms Against Phishing Attacks

نویسندگان

  • Klaus Plößl
  • Hannes Federrath
  • Thomas Nowey
چکیده

Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the client side, it can be implemented with little additional cost by financial institutions or other web retailers and therefore is a good compromise compared to the other approaches. A big drawback is that it doesn’t protect against man-in-the-middle attacks but most of the other approaches don’t either.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Protection Against Phishing and Web Spoofing

Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect against, mainly because they target non-cryptographic components, such as the user or the user-browser interface. This means that cryptographic security protocols, such as the SSL/TLS protocol, do not provide a complete solution to tackle the attacks and must be compleme...

متن کامل

Study on Protection Against Password Phishing

Phishing attack is new type of network attach and become a major nuisance on the internet. The rapidly progressof phishing attacksthe present secure socket layer is not able to provide and protect users from fraudulent websites. The attacks have been targeted the non-cryptographic security protocols likeTransport layer security and secure socket layerprotocols. These protocols are not sufficien...

متن کامل

Anders Persson Masterthesis

Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use " social engineering " attacks, such as phishing to gain access to the information inside [1] [15] [20]. Phishing is a growing problem that many different companies are trying to develop a working protection against. Th...

متن کامل

Defeating Active Phishing Attacks for Web-Based Transactions

Till now, the best defense against phishing is the use of two-factor authentication systems. Yet this protection is short-lived and comparatively weak. The absence of a fool-proof solution against Man-inthe-Middle, or Active Phishing, attacks have resulted in an avalanche of security practitioners painting bleak scenarios where Active Phishing attacks cripple the growth of web-based transaction...

متن کامل

Protection against Pharming and Phishing Attacks

The intention of this whitepaper is to provide a general view of phishing and pharming as electronic fraud techniques and to show how Easy Solutions, an innovative IT security company, approaches this problem providing a solution oriented to end-users who want to access transactional and conndential websites safely SUMMARY

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005