Pharewell to Phishing : Secure Direction and Redirection over the Web

نویسندگان

  • Taehwan Choi
  • Sooel Son
  • Mohamed G. Gouda
  • Jorge A. Cobb
  • Erik Jonsson
چکیده

The conventional wisdom has always been that users should refrain from entering their sensitive data (such as usernames, passwords, and credit card numbers) into http(or white) pages, but they can enter these data into https (or yellow) pages. Unfortunately, this assumption is not valid as it became clear recently that, through human mistakes or Phishing or Pharming attacks, a displayed yellow page may not be the same one that the user has intended to request in the first place. In this paper, we propose to add a third class of secure web pages called brown pages. We show that brown pages are more secure than yellow pages especially in face of human mistakes and Phishing and Pharming attacks. Thus users can enter their sensitive data into brown pages without worry. We present a login protocol, called the Transport Login Protocol or TLP for short. An https web page that is displayed on the browser is classified brown by the browser if and only if this web page has been called into the browser either through TLP or from within another brown page that had been called earlier into the browser through TLP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pharewell to Phishing

The conventional wisdom has always been that users should refrain from entering their sensitive data (such as usernames, passwords, and credit card numbers) into http(or white) pages, but they can enter these data into https (or yellow) pages. Unfortunately, this assumption is not valid as it became clear recently that, through human mistakes or Phishing or Pharming attacks, a displayed yellow ...

متن کامل

Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. In this paper, we prescribe a set of heuristics to identify redirects that can be exploited. Using these heuristics, we examine the prevalence of exploitable redirects present in today’s Web. Finally, we propose techni...

متن کامل

The Mobile Browser as a Web-Based Platform for Identity

Mobile devices have long been considered useful in bootstrapping authentication via other channels, including the web. As mobile devices begin to include complete web browsers, there is an opportunity to standardize a simple, web-based mobile authentication technique, both for devices themselves and for desktop access using the mobile device as a secondary channel. The path to better authentica...

متن کامل

طراحی سیستم خبره به منظور تشخیص حمله‌های فیشینگ در بانکداری الکترونیکی

In e-commerce and e-banking environments, one of the most risks or challenges which must be considered, is the risk of online fraud specially phishing attacks. In this study, we use some visual and technical identifies of a phishing web site as parameters to implement an expert system to diagnose this type of attack in electronic banking. In the proposed system, we use 27 different features as ...

متن کامل

Study on Protection Against Password Phishing

Phishing attack is new type of network attach and become a major nuisance on the internet. The rapidly progressof phishing attacksthe present secure socket layer is not able to provide and protect users from fraudulent websites. The attacks have been targeted the non-cryptographic security protocols likeTransport layer security and secure socket layerprotocols. These protocols are not sufficien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008