Protecting the Online User’s Information Against Phishing Attacks Using Dynamic Encryption Techniques
نویسندگان
چکیده
A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an alarming trend of increase in both the volume and the sophistication of phishing attacks. According to a description of phishing by APWG, the ways phishers steal consumers’ personal information consist of social engineering and technical subterfuge. In technical-subterfuge schemes, phishers furtively plant crime ware onto users’ computers to intercept their online account user names and passwords, while in social-engineering schemes they send spoofed e-mails to consumers purporting to be from legitimate businesses and agencies and then mislead consumers to counterfeit websites. When a user wants to access the website, the server sends an encrypted security code to the user through the communication protocol. If the user’s login name is not valid it will show an error message. If the user’s name is valid, the website checks the user’s registered account and sends an acknowledgement to that user. The legitimate or true webpage mimicked by the fake webpage is defined as the phishing target. Such phishing attacks if executed on newly created web pages prove difficult to identify as it becomes hard to tell which the phishing page is and which the target is. We anticipate that our approach would be deployed for websites requiring a high level of security and that it would ultimately help in remaining customer confidence in using web-based commerce. The automatic discovery of phishing target is proposed to solve the above problem.
منابع مشابه
Detecting Fake Websites Using Swarm Intelligence Mechanism in Human Learning
The internet and its various services have made users to easily communicate with each other. Internet benefits including online business and e-commerce. E-commerce has boosted online sales and online auction types. Despite their many uses and benefits, the internet and their services have various challenges, such as information theft, which challenges the use of these services. Information thef...
متن کاملGenerating Customer Relationship Management Efficiently Using Homomorphic Encryption
Due to the enormous increase in image database size as well as its vast deployment in various applications the need of Customer Relationship Management becomes a crucial part of today’s cutting edge technology. Online recommender systems are the ones that enable personalized service to users. The underlying techniques operate on privacy sensitive user data and these could be misused by the serv...
متن کاملProtecting Users against Phishing Attacks
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, 57 million US Internet users have identified the receipt of email linked t...
متن کاملUsing a Personal Device to Strengthen Password Authentication from an Untrusted Computer (Revised March 2007)?
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user’s long-term secret input from (typically untrusted) client PCs; a client P...
متن کاملUsing a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user’s long-term secret input from (typically untrusted) client PCs; a client P...
متن کامل