Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies
نویسندگان
چکیده
Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans. It is an extension of the concept of network security protocol and includes user interface and human-protocol interaction. We propose a model with which anti-phishing authentication ceremonies can be examined not only with a technical focus but by including the human into the analysis. The model examines anti-phishing authentication tasks that a human needs to apply, how users process these additional authentication tasks and how these tasks impact the human’s decision outcome. We outline the evaluation of the model and propose a ceremony called MultiStep Mutual Authentication (MSMA) that combines PIN, text password and dynamic image feedback as a help to foil phishing attacks. The MSMA ceremony is used as part of the evaluation of the model.
منابع مشابه
Poster: Towards a Model for Analysing Anti-Phishing Authentication Ceremonies
Phishing uses both social engineering and technical means to carry out attacks. Therefore, human factors incorrect human trust decisions play an important role in phishing. Many online authentication techniques place a disproportional burden on human abilities. Assumptions made about human-protocol behaviour are often flawed. In our approach we use the concept of a ceremony to analyse and impro...
متن کاملPhishing Secrets: History, Effects, Countermeasures
This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...
متن کاملPhishing Secrets: History, Effects, and Countermeasures
This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...
متن کاملSecurity Evaluation of Pattern Classifier against Phishing URL Detection
— Pattern classification is a branch of machine learning that focuses on recognition of patterns and regularities in data. In adversarial applications like biometric authentication, spam filtering, network intrusion detection the pattern classification systems are used. Extending pattern classification theory and design methods to adversarial environment is thus a novel and very relevant resear...
متن کاملMitigating Phishing with ID-based Online/Offline Authentication
Enforcing strong authentication is an option to mitigate phishing. However, existing authentication methods, like traditional digital signatures, require unrealistic full deployment of public key infrastructure(PKI) and destroy email users’ privacy in that the identity of an email sender is automatically revealed to the public. There have been some works in the literature, where the technology ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015