Intelligent Approach toward Anti-Phishing using Two Factor Authentication

نویسندگان

  • Hardik Desai
  • Deepak Gupta
  • Noopur Pandey
چکیده

Phishing is an attempt to commit fraud via social engineering. The impact is the breach of information security through the compromise of confidential data. Customers can access their banking accounts from anywhere in the world using their login ID and password. However, the use of password does not provide adequate protection against Internet fraud such as phishing. Phishing exploits this vulnerability to fraudulently acquire sensitive personal information, such as username, passwords and/or credit card details. Usually this is achieved by masquerading as a trustworthy person or business with an apparently legitimate request for information. In this paper we have proposed a new approach named as IAPC which includes captcha followed by two factor authentication. Two factor authentication is carried out using steganography mechanism to hide the password inside an image. MD5 and DES (Data Encryption Standard) encryption techniques are used to encrypt the hidden password.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-Phishing Strong Authentication Technology Options

The United States banking industry has been directed by its regulatory agencies to provide authentication stronger than single factor for “high risk” transactions, as a defense against phishing. Financial institutions have a wide array of options available to them to meet this requirement, and choosing among those options is likely not a simple matter. Factors involved in the decision process i...

متن کامل

Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems

Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low falsepositive rates, but blacklist approaches utilizes website URLs only. This study analyses and combines phishing emails and phishing web-forms in a single framework, which allows feature extraction and feature model construction. The outcome should classify between phishing, suspicious, legit...

متن کامل

Phishing Secrets: History, Effects, Countermeasures

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

متن کامل

Phishing Secrets: History, Effects, and Countermeasures

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

متن کامل

A Two Factor Based Anti-Phishing Method in Open ID

With the exponential growth in web based applications, a typical user has to create a lot of usernames and passwords in order to use these services, while using these services user have to keep track of her credentials which in turns results in high probability of identity theft. A secure and reliable identity management system is required in this scenario. OpenID is a good solution to interact...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013