Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks

نویسندگان

  • Sebastian Gajek
  • Ahmad-Reza Sadeghi
  • Christian Stüble
  • Marcel Winandy
  • Horst Görtz
چکیده

Identity theft through phishing attacks has fostered to a major concern of Internet users. Classical phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks designed to target certain services. This paper aims at making the first steps towards the design and implementation of an open source and interoperable security architecture that prevents both classical and malware phishing attacks. Our approach is based on the ideas of (i) the multicolored computing (e.g., red for the risky and green for the trusted domain), and (ii) a trusted wallet for storing credentials and authenticating sensitive services. Our solution requires no special care from users for identifying the right web sites while the disclosure of credentials is strictly controlled. We present the main idea of how to integrate countermeasures against Phishing and malware into one sound security architecture. Our approach establishes compartmented security for mounting isolated applications, provides a secure graphical user interface to configure sensitive applications, and performs secure booting to preserve the system integrity. We also give hints on how to implement this architecture efficiently by utilizing trusted computing functionality and virtualization.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Shield Algorithm (DSA) for Security against Phishing Attacks

The World Wide Web provides every internet citizen with voluminous and heterogeneous data. Therefore, it becomes an essential to mine this available data to make it presentable, useful, and pertinent to a particular problem. Web mining deals with the extraction of these interesting patterns and developing useful abstracts from diversified sources. To improve the security of Web services one wou...

متن کامل

Multilayer Approach to Defend Phishing Attacks

Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; theref...

متن کامل

Web Browser Security: Different Attacks Detection and Prevention Techniques

In this paper, we present a systematic study of how to make a browser secure. Web browser is vulnerable to different attacks; these attacks are performed due to vulnerabilities in the UI of the web page, Browser cache memory, extensions, plug-in. The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities. Buffer overflow attack, Cross-site-scripting, Man-in-...

متن کامل

Integrating self-efficacy into a gamified approach to thwart phishing attacks

Security exploits can include cyber threats such as computer programs that can disturb the normal behavior of computer systems (viruses), unsolicited e-mail (spam), malicious software (malware), monitoring software (spyware), attempting to make computer resources unavailable to their intended users (Distributed Denial-of-Service or DDoS attack), the social engineering, and online identity theft...

متن کامل

Web Security Requirements: A Phishing Perspective

We are currently focusing on web security problems caused by phishing, and similar semantic attacks against users. Our current investigations are leading towards heuristic, collaborative, and semantic approaches towards thwarting such attacks. Additionally, we are considering new approaches to authentication that minimize the room for user error in the presence of semantic attacks. We feel that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006