Pixastic: Steganography based Anti-Phihsing Browser Plug-in
نویسندگان
چکیده
In spite of existence of many standard security mechanisms for ensuring secure eCommerce business, users still fall prey for online attacks. One such simple but powerful attack is ‘Phishing’. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses information hiding technique Steganography. A Robust Message based Image Steganography (RMIS) algorithm has been proposed. The same has been incorporated in the form of a browser plug-in (safari) called Pixastic. Pixastic is tested in an online banking scenario and it is compared with other well-known anti-phishing plug-in methods in practice. Various parameters such as robustness, usability and its behavior on various attacks have been analysed. From experimental results, it is evident that our method Pixastic performs well compared to other anti-phishing plug-ins.
منابع مشابه
An Empirical Analysis of the Effectiveness of Browser-based Anti- phishing Solutions
Phishing has by far become the most dangerous form of fraud to hit online business. Due to the key role in accessing the Internet, web browsers are at a strategic position to offer the protection against the risks of phishing attacks. Varieties of security companies have proposed their browser-based antiphishing solutions to protect the end-use. In this paper, we used 3403 fresh phishing URLs a...
متن کاملBrowser Session Preservation and Migration
We introduce a browser session preservation and migration (BSPM) infrastructure that allows a user to take a snapshot of an active web session state on a browser. The BSPM infrastructure allows the user to retrieve the snapshot at a later time on a browser to continue the same active web session on any device. The design of the BSPM infrastructure is based on a browser-side plug-in that can cap...
متن کاملBrowser security
The past decade has shown that the browser is a vulnerable application. Vulnerabilities are still frequently being discovered for all browsers. Besides this, a typical browser has more than one plug-in installed and through the vulnerabilities associated with plug-ins fully patched browsers are at risk. Even if a browser and its plug-ins are patched and no vulnerabilities are known, the browser...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملWeb Browser Security: Different Attacks Detection and Prevention Techniques
In this paper, we present a systematic study of how to make a browser secure. Web browser is vulnerable to different attacks; these attacks are performed due to vulnerabilities in the UI of the web page, Browser cache memory, extensions, plug-in. The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities. Buffer overflow attack, Cross-site-scripting, Man-in-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1206.2445 شماره
صفحات -
تاریخ انتشار 2012