skip to main content
10.1145/2345396.2345494acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

Secret information display based authentication technique towards preventing phishing attacks

Authors Info & Claims
Published:03 August 2012Publication History

ABSTRACT

Phishing is a fraudulent technique used by attackers known as phishers for obtaining credentials (username and passwords) of a specific or group of users on internet. Phishing came into focus in 1996, and from then it is emerging out as one of the biggest cybercrime attacks on internet. The solutions for handling phishing attacks include: detecting the activity and filtering it from normal activity (Phished Email and Website detection), preventing it by the use of excellent user interfaces and login authentication schemes and user training so that users can prevent themselves from being falling into it. Researchers have focused on all the three techniques for solving phishing attacks. However the previous techniques handle the problem of phishing to an extent but are incomplete, and complex to implement or use in actuality. The research work in this paper will be focused on the critical review of previous schemes proposed, with a novel scheme for preventing phishing attacks with the use of four characters secret information display during login authentication. The novelty of the scheme lies in its low complexity, better user understandability and real time implementation ability. This paper also describes the analyzed results of a real time experiment done to evaluate the scheme. Our results show great improvement with a total of only 13.5%, 1% and 3% user's phished in rigorous phishing attempts, of various kinds for a period of one month.

References

  1. Varshney, G., Joshi, R. C. Sardana, A. 2011. Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing. In proceedings of the fourth International Conference on Contemporary Computing, IC3-2011, Communications in Computer and Information Science, 2011, Volume 168, part 3, pp. 491--500.Google ScholarGoogle Scholar
  2. Pandove, K., 2010. Email Spoofing. International Journal of Computer Applications, Volume 5-No. 1.Google ScholarGoogle ScholarCross RefCross Ref
  3. Christine E. D., Jonathan, J. O., and Eugene J. K. Anatomy of a Phishing Email. Mail frontier, Inc., Palo Alto, CA, USA.Google ScholarGoogle Scholar
  4. APWG Anti Phishing Working Group. http://www.antiphishing.orgGoogle ScholarGoogle Scholar
  5. Sheng, S., Wardman, B., Warner, G., Carnor, L. F., Hong, J., and Zhang, C., 2009. "An empirical analysis of phishing blacklists".Google ScholarGoogle Scholar
  6. Toolan, F., Carthy, J., Feature Selection for Spam and Phishing Detection. 2010. In Proceedings of eCrime Researchers Summit (eCrime).Google ScholarGoogle Scholar
  7. Fette, I., Sadeh, N., Tomasic, A. 2007. Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web, May 08--12, 2007, Banff, Alberta, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chandrashekharan, M., Narayan, K., and Upadhyaya, S. 2006. Phishing email detection based on structural properties. In Proceedings of the NYS Cyber Security Conference.Google ScholarGoogle Scholar
  9. Adida, B., et. al. 2005. Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails. In Proceedings of the DIMACS Workshop on Theft in E-Commerce.Google ScholarGoogle Scholar
  10. Zhang, Y. et. al. 2007. Catina: A Content-Based Approach to Detecting Phishing Web Sites. In Proceedings of the 16th international conference on World Wide Web. NY, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sanglerdsinlapachai, N. and Rungsawang, A. Using Domain Top-page Similarity Feature in Machine Learning-based Web Phishing Detection. In Proceedings of 3rd International Conference on Knowledge Discovery and Data Mining, pp. 187--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. DKIM.org, http://www.dkim.org.Google ScholarGoogle Scholar
  13. Singh, A. P., et. al. 2011. Detection and Prevention of Phishing Attack Using Dynamic Watermarking. Information Technology and Mobile Communication, Communications in Computer and Information Science. Volume 147, Part 1, 132--137.Google ScholarGoogle ScholarCross RefCross Ref
  14. Liou, J. C. et. al. 2011. A Sophisticated RFID Application on Multi-Factor Authentication. In Proceedings of the Eighth International Conference, Information Technology: New Generations (ITNG). Las Vegas, pp. 180--185, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Parno, B. et. al. 2006. Phoolproof Phishing Prevention. Financial Cryptography and Data Security, Lecture Notes in Computer Science. Vol. 4107/2006, pp. 1--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Fraser, N., The usability of picture password. Unpublished.Google ScholarGoogle Scholar
  17. Dhamija, R. Tygar, J. D. 2005. The Battle Against Phishing: Dynamic Security Skins. In Proceedings of the 2005 symposium on Usable privacy and security, SOUPS '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ross, B. 2005. Stronger Password Authentication Using Browser Extensions. In Proceedings of the Security '05 Technical Program. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hiltgen, A. et. al. 2006. Secure Internet banking authentication. Security & Privacy, IEEE, Volume 4, No. 2, pp. 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kyeongwon, C. et. al. 2011. A mobile based antiphishing authentication scheme using QR code. In Proceedings of Mobile IT Convergence (ICMIC) pp. 109--113.Google ScholarGoogle Scholar
  21. Kumaraguru, P. et. al. 2007. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. In proceedings of the SIGCHI conference on Human factors in computing systems, New York, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Florencio, D. and Herley, C. 2006. Password Rescue: A New Approach to Phishing Prevention. In Proceedings of the 1st USENIX Workshop on Hot Topics in Security, HOTSEC'06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Secret information display based authentication technique towards preventing phishing attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
      August 2012
      1307 pages
      ISBN:9781450311960
      DOI:10.1145/2345396

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader