Abstract
Fake Web sites fool the unwary into divulging personal data, undermining all consumers' trust in e-commerce, no matter how trustworthy the authentic online business truly is.
- Berghel, H. Hijacking the Web. Commun. ACM 45, 4 (Apr. 2002), 23--27. Google ScholarDigital Library
- FBI National Press Office. Web `Spoofing' Scams Are a Growing Problem. Press Release, Washington D.C., July 21, 2003; www.fbi.gov/pressrel/pressrel03/spoofing072103.htm.Google Scholar
- Felten, E., Balfanz, D., Dean, D., and Wallach, D. Web spoofing: An Internet con game. In Proceedings of the 20th National Information Systems Security Conference (Baltimore, Oct. 7--10, 1997), 95--104; csrc.nist.gov/nissc/1997/proceedings/toc.pdf.Google Scholar
- Gallagher, D. Users find too many phish in the Internet sea. New York Times (Sept. 20, 2004).Google Scholar
- Hafner, K. and Flynn, L. E-mail swindle uses false report about a swindle. New York Times (June 21, 2003).Google Scholar
- Hu, Q. and Dinev, T. Is spyware an Internet nuisance or public menace? Commun. ACM 48, 8 (Aug. 2005), 61--66. Google ScholarDigital Library
- Levi, A. and Koc, C. Risks in email security. Commun. ACM 44, 8 (Aug. 2001), 112--113. Google ScholarDigital Library
- Mayer, C. `Phishing' season for tax scammers. IRS warns public of phony e-mails. Washington Post (Feb. 25, 2006), 10.Google Scholar
- McGuire, D. FTC, businesses renew fight against ID theft. Washington Post (Sept. 3, 2003).Google Scholar
- Tedeschi, B. E-commerce report: Trying to reach customers in an era of e-mail suspicion. New York Times (Dec. 6, 2004), 15.Google Scholar
- U.S. Federal Trade Commission. Prepared Statement on Identity Theft and Social Security Numbers Before the Subcommittee on Social Security of the House Committee On Ways And Means. Washington, D.C., Mar. 30, 2006; www.ftc.gov/os/2006/03/P065404CommissionTestimonyConcerningIdentityTheftandSSNs03302006.pdf.Google Scholar
- Ye, Z., Yuan, Y., and Smith, S. Web Spoofing Revisited: SSL and Beyond. Technical Report TR2002-417, Department of Computer Science, Dartmouth College, Hanover, NH, Feb. 1, 2000; www.cs.dartmouth.edu/~pkilab/demos/spoofing/.Google Scholar
Index Terms
- Why spoofing is serious internet fraud
Recommendations
On investigating ARP spoofing security solutions
The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-...
ARP spoofing: a comparative study for education purposes
InfoSecCD '09: 2009 Information Security Curriculum Development ConferenceARP spoofing attack, one of the most important security topics, is usually taught in courses such as Intrusion Detection in Local Area Networks (LANs). In such a course, hands-on labs are very important as they facilitate students' learning on how to ...
Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network
IoT devices are placed at open places, generally at where monitoring and controlling of devices from remote location is difficult. Location spoofing is a threat in which an intruder intentionally modifies the contextual information such as geolocation of ...
Comments