Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking
Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
Author(s) keywords: phishing, secret image, security, shares, visual cryptography
Reference keywords: cyber-attacks, data encryption
Abstract:
Phishing is deceptive attempt that targets an individual or an organization, seeking unauthorized access to confidential data or personal credentials such as credit card information, passwords etc. by an individual that poses as a reputable entity or person. It has become a stern threat to companies that deal with E-transactions. If these threats cannot be ceased, people cannot trust online transactions that include authentication over credentials. In the project, we have used an image-based authentication using Visual Cryptography (VC).The integrity of the secret image is maintained by dividing the secret image into two splits using VC, one is stored in server side database and other is given to the user such that the Secret Image can be recognized only when both the splits are concurrently available. The technique of both image processing and a cryptography is used in my project. Image processing is a technique to transform the secret image into digital form and carry out some operation on it, in a visual cryptography the Secret Image is splitting into splits and is kept in the server database, after login by the user, the Secret Image should get a match with its content behind the image. After both user and server side shares get matched, the user can login into the website very securely.
References:
[1]. G. L. Haijun Zhang and T. W. S. Chow, “Textual and visual content based anti-phishing: A bayesian approach,” IEEE Trans. Neural Netw., vol. 22, no. 10, Oct. 2015.
[2]. D. James and M. Phillip, “A novel anti-phishing framework based on visual cryptography,” airccse.org//journel vol.3, no.1. pp.1264-3459, 2014.
[3]. P. Cheng and C. Chen., “New antiphishing method with two types of passwords in open id system,” in Proceedings of IEEE Fifth International Conference on Genetic and Evolutionary Computing, 2014.
[4]. V. A. G. Thiyagarajan, P.; Venkatesan, “Anti-phishing technique using automated challenge response method,,” in Proceedings of IEEE- International Conference on Communications and Computational Intelligence, 2014.
[5]. C. Jackson and A. Barth, “Beware of finer-grained origins,” 12th Information Security International Conference, Pisa, Italy, 2013.
[6]. R. Youmaran and A. Miri, “An improved visual cryptography scheme for secret hiding,” in 23rd IEEE Biennial Symposium on Communications, 2014.
[7]. J. C. Haidong Xia, “Hardening web browsers against man-in-the middle and eavesdropping attacks,” WWW ’05 Proceedings of the 14th international conference on World Wide WebPages 489-498 in ACM New York, NY, USA, 2015.
[8]. M. A. H. K. Dahal.;, “Modelling intelligent phishing detection system for e-banking using fuzzy data mining,” in Proceedings of IEEE Conference on CyberWorlds,, 2015.
[9]. J. Sunshine, S. Edelman and L. F. Cranor, “Crying wolf: An empirical study of SSL warning effectiveness,” in Proceedings of the 18th USENIX Security Symposium, 2013.
[10]. M. Nourian. A.; Ishtiaq S., “Castle: A social framework for collaborative antiphishing databases,” in Proceedings of IEEE- 5th International Conference on Collaborative Computing: Networking Applications, and Worksharing, 2014.
[11]. S. G. K. Nirmal, K.; Ewards, “Maximizing online security by providing a 3-factor authentication system to counter-attack ’phishing,” IEEE International Conference on Emerging Trends in Robotics and Communication Technologies, 2014.
[12]. D. G. A. Dan Wendlandt and A. Perrig, “Improving SSH-style host authentication with multi-path probing,” ATC’14 USENIX 2014 Annual Technical Conference Pages 321-334 USENIX Association Berkeley, CA,USA, 2014.
Article Title: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking
Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
Date of Publication: 2016-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2016.01.07
Issue: Volume 5, Issue 1, Year 2016
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 75-80 (6 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.