Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks
نویسندگان
چکیده
Identity theft through phishing attacks has fostered to a major concern of Internet users. Classical phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks designed to target certain services. This paper aims at making the first steps towards the design and implementation of an open source and interoperable security architecture that prevents both classical and malware phishing attacks. Our approach is based on the ideas of (i) the multicolored computing (e.g., red for the risky and green for the trusted domain), and (ii) a trusted wallet for storing credentials and authenticating sensitive services. Our solution requires no special care from users for identifying the right web sites while the disclosure of credentials is strictly controlled. We present the main idea of how to integrate countermeasures against Phishing and malware into one sound security architecture. Our approach establishes compartmented security for mounting isolated applications, provides a secure graphical user interface to configure sensitive applications, and performs secure booting to preserve the system integrity. We also give hints on how to implement this architecture efficiently by utilizing trusted computing functionality and virtualization.
منابع مشابه
Data Shield Algorithm (DSA) for Security against Phishing Attacks
The World Wide Web provides every internet citizen with voluminous and heterogeneous data. Therefore, it becomes an essential to mine this available data to make it presentable, useful, and pertinent to a particular problem. Web mining deals with the extraction of these interesting patterns and developing useful abstracts from diversified sources. To improve the security of Web services one wou...
متن کاملMultilayer Approach to Defend Phishing Attacks
Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; theref...
متن کاملWeb Browser Security: Different Attacks Detection and Prevention Techniques
In this paper, we present a systematic study of how to make a browser secure. Web browser is vulnerable to different attacks; these attacks are performed due to vulnerabilities in the UI of the web page, Browser cache memory, extensions, plug-in. The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities. Buffer overflow attack, Cross-site-scripting, Man-in-...
متن کاملIntegrating self-efficacy into a gamified approach to thwart phishing attacks
Security exploits can include cyber threats such as computer programs that can disturb the normal behavior of computer systems (viruses), unsolicited e-mail (spam), malicious software (malware), monitoring software (spyware), attempting to make computer resources unavailable to their intended users (Distributed Denial-of-Service or DDoS attack), the social engineering, and online identity theft...
متن کاملWeb Security Requirements: A Phishing Perspective
We are currently focusing on web security problems caused by phishing, and similar semantic attacks against users. Our current investigations are leading towards heuristic, collaborative, and semantic approaches towards thwarting such attacks. Additionally, we are considering new approaches to authentication that minimize the room for user error in the presence of semantic attacks. We feel that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006