SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
In-depth
                                Phishing Attacks: A Challenge Ahead
Author                            Password-based authentication is used in online web applications due to its simplic-
                                  ity and convenience. Efficient password-based authentication schemes are required
Sandeep K. Sood
                                  to authenticate the legitimacy of remote users, or data origin over an insecure com-
Head & Associate Professor,
G.N.D.U. Regional Campus,         munication channel. Password-based authentication schemes are highly susceptible to
India                             phishing attacks.
san1198@gmail.com
                                  Phishing attacks are becoming more and more sophisticated and therefore require
                                  strong countermeasures, a task complicated by their elusive nature; phishing sites
Tags                              cause damage in a short time span, going online and vanishing. This type of attack is
                                  causing a direct damage to the financial industry and is also affecting the expansion
password authentication,          of e-commerce. Thus, financial transactions in web applications require highly secure
phishing, browser indicators,     authentication protocols and need countermeasures against phishing in order to make
cookies, dynamic identity
                                  online transactions reliable and secure.

                                  In this paper, we present a survey of different anti-phishing techniques based on sev-
                                  eral crucial criteria. This study will help in developing different password-based anti-
                                  phishing authentication techniques for web applications.



                                1. Introduction
                                Authentication is reliably identifying an entity. It is the most important defence in the secu-
                                rity of a system. The active hackers, dictionary attacks, phishing scams and other malicious
                                threats have brought great challenges and potential threats to online transactions. Authen-
                                tication is essential because the numbers of online transactions are increasing exponentially
                                on the web. The most common verification technique is to check whether claimant pos-
                                sesses some information or characteristics that a genuine entity should possess. Authentica-
                                tion process gets complicated when text, visual or audio clues are not available to verify the
                                identity. Authentication protocols are capable of simply authenticating the user to the con-
                                necting party and vice-versa. The current technologies used in authentication are password,
                                smart card, passphrase, biometrics, public key cryptography, zero knowledge proof, digital
                                signature, SSL/TLS (Secure Socket Layer/ Transport Layer Security), IPsec (IP Security) and
                                secure shell. The selection of an environment appropriate authentication method is one of
                                most crucial decisions in designing secure systems.

                                Phishing is an online identity theft that combines social engineering and website spoofing
                                techniques to cheat the user by redirecting his confidential information to an untrusted
                                destination. The attacker can use this information in online transactions to make an illegal
                                economic profit. In a phishing attack, the attacker sends a large number of spoofed e-mails
                                to random Internet users that appear to be coming from a legitimate business organization
                                such as a bank. The e-mail requests the recipient to update his personal information and also
                                warns that failure to reply the request will result in closure of his online banking account.
                                The victim follows the phishing link provided in the e-mail and is directed to a website that



       ing
  earn
                                                          eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                       28
                         u
                    ers.e
                gpap
   www
      .elea
            rnin                                                                                          n.º 28 • April 2012
Pap
                                                                                                                           1
In-depth

is under the control of the attacker. The average user can not        2. Literature Review
distinguish a well designed phishing website from the legitimate
site because the phishing site is prepared in a manner that imi-      To mitigate the risk of phishing attacks, defense mechanisms
tates visual characteristics of the target organization’s website     have been deployed at both the client and the server sides.
by using similar colors, icons, logos and textual descriptions.       These solutions include the digitally signed e-mail (S/MIME),
Password based authentication is highly susceptible to phishing       anti-phishing plug-ins for browsers like SpoofGuard(1), Kirda
attacks by exploiting the visual resemblance of domain names          and Kruegel’s measures(2), blacklist integration into Internet Ex-
to allure the victims (e.g. www.paypai.com instead of actual          plorer browser(3), Google safe browsing(4) and Mozilla phishing
www.paypal.com). Phishing attacks are increasing despite the          protection(5).
use of preventive measures like e-mail filters and content analy-
                                                                      In 1999, RFC 2617(6) proposed a Digest Access Authentication
sis. The effectiveness of these anti-spam techniques depends
                                                                      scheme that uses a password digest to authenticate a user. In
upon many critical factors such as regular filter training. There
                                                                      2004, Herzberg and Gbara(7) constructed a TrustBar that associ-
is still a possibility that some of the phishing e-mails manage
                                                                      ates the logo with the public key certificate of the visited site.
to get through the filters and reach the potential victims. The
                                                                      In 2004, SecurID(8) scheme was suggested that uses one-time
phishing attacks are becoming more and more sophisticated
                                                                      password for authentication and has been deployed in a num-
and therefore require strong countermeasures. It is important
                                                                      ber of financial organizations. In 2005, PwdHash(9) scheme was
to detect the phishing sites early because most of them are
                                                                      suggested that authenticates a user with one-way hash(10) on
short-lived and cause the damage in the short time span be-
                                                                      <password, domain name> instead of the password only so as
tween appearing online and vanishing. Phishing is doing direct
                                                                      to defeat the visual similarity of the domain name. This tech-
damage to the financial industry and is also affecting the expan-
                                                                      nique creates a domain specific password that becomes use-
sion of e-commerce.
                                                                      less if it is submitted to another domain. However, PwdHash is
One of the solutions to counter phishing is to render the brows-      susceptible to offline dictionary attack and ineffective against
ers with security indicators such as use of https in URL bar,         pharming or DNS spoofing attack where the attacker presents
locked icon, public key certificate and security warnings. The        correct domain name to the browser but redirects the user’s re-
main reason for the success of phishing attacks is that average       quest to its own server. In 2005, Synchronized Random Dynamic
users do not constantly notice the presence of security indica-       (SRD)(11) scheme was suggested that is having an internal refer-
tors and do not know how to interpret them. A solution is re-         ence window, whose color changes randomly and sets up the
quired in which the user does not have the need of interpreting       boundary of the browser window with different colors accord-
the browser based security indicators.                                ing to certain rules. This scheme is impractical for hand held de-
                                                                      vices and is also ineffective if the attacker creates a bogus refer-
Phishing attacks are so powerful that many suggested counter-         ence window to overlap the original reference window. In 2005,
measures are not very effective. Naive users are easy targets of      Dhamija and Tygar(12) proposed a technique that uses Dynamic
phishing attacks. Pharming accomplishes same thing as phish-          Security Skin (DSS) on the user’s browser. It creates a dedicated
ing by using Domain Name Server (DNS) spoofing but without            window containing a specific image shared between the user
spam e-mail. Here adversary plants false code on DNS itself by        and the server for inputting user name and password so as to
DNS spoofing attack. Hence anyone entering correct web site           defeat a bogus window. In 2005, SpoofGuard(1) technique was
address will be directed by DNS to fake site.                         suggested that examines the domain name, images and links
                                                                      on the web pages and raises an alarm to the users if the site
This paper is organized as follows. In next section, we explore
                                                                      has a high probability of being a phishing site. In 2005, Adels-
the literature on existing anti-phishing protocols. Then the pa-
                                                                      bach et al.(13) combines different concepts of an adaptive web
per discusses the various anti-phishing password protocols in
                                                                      browser toolbar that summarizes all relevant information and
terms of security, cost and performance. We present future re-
                                                                      allows user to get required crucial information at a glance. This
search directions and finally we conclude the paper.
                                                                      toolbar is a local component of user’s system on client side and
                                                                      hence a remote attacker can not access it by means of active
                                                                      web languages. The main disadvantage of this toolbar scheme is
                                                                      that the user has to recognize his personal image at each login.



        ing
   earn
                                                                    eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                 n.º 28 • April 2012
 Pap
                                                                                                                                     2
In-depth

In 2006, Wu et al.(14) found that 13-54 % of the users visited          the Google. In 2007, Zhang et al.(22) performed a similar study
phishing websites, despite the warnings from anti-phishing              that tested the detection rates of different blacklist based anti-
toolbars. Several browser toolbars like SpoofGuard and TrustBar         phishing solutions. Their dataset includes 100 phishing URLs
have been proposed to find a pattern in phishing websites and           collected over a period of three days in November 2006. They
alerts the user if the given site matches the pattern. In 2006,         analyzed ten toolbars experimentally and reported that the only
Juels et al.(15) suggested the use of cache cookies for the user        toolbar consistently identifying more than 90 % of phishing URLs
identification and authentication that uses the browser cache           also classified 42 % of legitimate URLs incorrectly as phishing.
files to identify the browser. These cookies are easy to deploy         VeriSign(23) is providing a commercial anti-phishing service. The
because it does not require installation of any software on the         company is crawling millions of web pages to spot out clones to
client side. Then they extended the concept to active cookie            identify phishing websites. In 2007, Adida(24) suggested a Frag-
scheme, which stores the user’s identification and a fixed IP ad-       Token scheme that uses the URL portion as an authenticator
dress of the server. During the client’s visits to the server, the      and accordingly change response for authentication. FragToken
server will redirect the client request to the fixed IP address so      is only useful in low security environment like blog because it is
as to defeat phishing and pharming attacks. SiteKey has been            vulnerable to man-in-the-middle attack.
deployed by the bank of America(16) and Yahoo’s sign-in seal(17)
                                                                        In 2007, Gouda et al.(25) proposed an anti-phishing single pass-
to prevent a phishing attack. Initially, it recognizes the client’s
                                                                        word protocol that allows the user to choose a single password
browser by a previously installed cookie and then requests the
                                                                        of his choice for multiple online accounts on the web. In 2008,
user to enter his user name. After successful authentication, a
                                                                        Yongdong et al.(26) proposed SSO anti-phishing technique based
user specific image is displayed on the browser. Finally, the user
                                                                        on encrypted cookie that defeats phishing and pharming at-
submits his password after recognizing the image displayed on
                                                                        tacks. They mentioned different reasons for web spoofing like
the browser to authenticate itself. In 2006, Automatic Detect-
                                                                        self signed certificates or insertion of a spoofed image repre-
ing Security Indicator (ADSI)(18) was proposed as an enhance-
                                                                        senting security indicator where one does not exist. Most of the
ment of toolbar scheme that generates a random picture and
                                                                        users can not distinguish the spoofed browser’s security indica-
embeds it in to the existing web browser. It can be triggered by
                                                                        tors from actual security indicators such as public key certificate,
any security related event occurred on browser and then per-
                                                                        URL bar and locked icon. It encrypts the sensitive data with the
forms automatic checking on current active security status. In
                                                                        server’s public key and stores this cookie on the user’s comput-
case mismatch in embedded images is detected, an alarm goes
                                                                        er. This Encrypted Cookie Scheme (ECS) has advantage that the
off to alert the users. ADSI can not prevent man-in-the-middle
                                                                        user can ignore SSL indicator in online transaction procedure.
and phishing attacks with self sign certificate.
                                                                        NetCraft Tool Bar(27) is based on risk rating system. Risk is com-
In 2007, Ludl et al.(19) analyzed legitimate and phishing websites
                                                                        puted based on the age of domain. This technique uses the
to define the metrics that can be used to detect a phishing site.
                                                                        database of phishing sites and hence might not recognize new
In 2007, Microsoft deployed Sender ID(20) and Yahoo deployed
                                                                        phishing sites successfully. SpoofStick(28) provides basic domain
DomainKeys(17) protocols to detect the phishing e-mails. In
                                                                        information. It will show that you are on paypal.com when you
2007, Karlof et al.(21) proposed the cookies based Locked Same
                                                                        are on paypal site or will display you are on IP address of spoofed
Origin Policy (LSOP) that enforces access control for the SSL web
                                                                        site. It is not efficient against spoofed sites opened in multiple
objects based on the server’s public key. In 2007, Microsoft in-
                                                                        frames. McAfee SiteAdvisor(29) protects the users from spyware
tegrated the blacklisted phishing domains in to the web brows-
                                                                        and ad-ware attacks. It uses the crawler to create a large data-
er so that browser refuses to visit these phishing websites. In
                                                                        base of malware and test results on them to provide rating for
2007, Google Safe Browsing uses a blacklist of phishing URLs to
                                                                        a site. This technique will not be able to find new phishing sites.
find out a phishing site. This technique can not recognize those
                                                                        The ebay Tool Bar(30) solution is based on “Account Guard” that
phishing sites which are not present in the blacklist maintained
                                                                        changes color if the user is on a spoofed site and is specifically
by the server. This approach can prevent phishing attack if the
                                                                        designed for ebay and paypal websites.
fraudulent sites are discovered and listed quickly. A study car-
ried out by the Microsoft in 2007 reported that the Microsoft’s
blacklist is superior to the Google’s blacklist. Another study ini-
tiated by the Mozilla drew the opposite conclusion in favor of


        ing
   earn
                                                                      eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                   n.º 28 • April 2012
 Pap
                                                                                                                                       3
In-depth

3. 	Discussion                                                          spoofed site. It is not efficient technique against spoofed sites
                                                                        opened in multiple frames. McAfee SiteAdvisor protects the us-
Security Requirements                                                   ers from spyware and ad-ware attacks. It uses the crawler to
                                                                        create a large database of malware and test results on them to
Password is the most commonly used technique to authenticate            provide rating for a site. This technique will not be able to find
the users on the web. Short and easily memorable passwords              new phishing sites. The ebay Tool Bar solution is based on “Ac-
are susceptible to attacks on insecure communication channels           count Guard” that changes color if the user is on a spoofed site
like the Internet. On the other hand, the users find it difficult       and is specifically designed for ebay and paypal web sites.
to remember long and complex passwords. A common practice
adopted by the users is to choose a single strong password and          Countermeasures to online dictionary attacks are provided by
use it for multiple accounts, instead of choosing a unique pass-        Pinkas and Sander(33). Several techniques are available to with-
word for each account(31). The attacker can learn the password          stand dictionary attacks. Most of the existing password based
of a user from a less secure site and reuse it to compromise a          authentication schemes are vulnerable to different attacks (e.g.
secure site. An insider or a person close to the user has the max-      dictionary, phishing, man-in-the-middle) and hence not able
imum ability to steal the user’s password because most of the           to serve as an ideal password authentication scheme. The fast
users chosen passwords are limited to the user’s personal do-           development in Internet and web technologies for online ap-
main. Therefore, the password based authentication schemes              plications such as e-commerce and e-government is increasing
are vulnerable to phishing, dictionary, man-in-the-middle and           at exponential rate. Once the server authenticates the user’s
insider attacks. Hacking and identity thefts are the two main           input, web server sends the confidential page to user’s browser
concerns in password based authentication protocols. Phish-             window. User’s password sent to a server for authentication
ing attacks are also increasing significantly in online transac-        is subject to phishing attacks. User may have disclosed sensi-
tions. Information Technology (IT) companies such as Microsoft,         tive data to an adversary during its visit to a fake or unreliable
Google, America On Line (AOL) and Opera have recently started           server. Security requirements for password based authentica-
announcing browser integrated blacklist based anti-phishing so-         tion protocol requires resistance against different attacks such
lutions. A solution is required to list out the new phishing sites      as phishing, dictionary, man-in-the-middle, denial of service,
in blacklist database quickly otherwise they will do the damage         impersonation, forward secrecy, server spoofing, replay, smart
before being included in the blacklist database. Researchers are        card loss, stolen-verifier and parallel session and should achieve
putting efforts in developing better password based authenti-           mutual authentication.
cation protocols that should achieve required goals and satisfy
security requirements to withstand all possible attack scenarios.       Goals
In 2006, Wu et al.(32) gave different reasons for web spoofing          Most of the user’s finds it difficult to understand security indi-
like placing a spoofed image with security indicator even though        cators. Researchers are working for effective browser integrat-
it does not exist and self signed certificates. Most of users find      ed blacklist based solutions and other different techniques to
it difficult to interpret browser security indicators correctly and     thwart phishing attacks. An adversary can masquerade as a legal
clues such as URL bar, locked icon, certificate dialogs and secu-       user by stealing user’s identity and password stored in plain text
rity warnings.                                                          from the password table stored on remote server. Hashed or
                                                                        encrypted passwords can solve this problem. Lamport(34) pro-
Google Safe Browsing uses a blacklist of phishing URLs to find
                                                                        posed one-time password with one-way hash function that was
out a phishing site. This technique can not recognize those
                                                                        secure against replay attacks. Password reuse rates increases
phishing sites which are not present in the black list maintained
                                                                        because people accumulate more accounts but did not create
by server. NetCraft Tool Bar is based on risk rating system. Risk
                                                                        more passwords. Researchers have conducted experimental
is computed based on the age of domain. This technique uses
                                                                        studies of password use and concluded that people inclined to
the database of phishing sites and hence might not recognize
                                                                        pick passwords that represent themselves. Personalized pass-
new phishing sites successfully. SpoofStick provides basic do-
                                                                        words such as phone numbers, vehicle number, pet’s name or
main information. It will show that you are on paypal.com when
                                                                        a social security number can be cracked given a large enough
you are on paypal site or will display you are on IP address of
                                                                        dictionary tries. Gaw et al.(35) give tips and rules for creating



        ing
   earn
                                                                      eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                  n.º 28 • April 2012
 Pap
                                                                                                                                      4
In-depth

strong passwords: use of both uppercase and lowercase let-                         freely, not revealing password to the server, password trans-
ters, at least six characters, avoid common literary names, mix                    mission should not be in clear text, appropriate password for
up two or more separate words, create an acronym from an                           memorization, unauthorized login can be detected quickly and
uncommon phrase, avoid passwords that contain login iden-                          the scheme should be secure even if the secret key of the server
tity, use of numbers, dropping of letters from a familiar phrase,                  is leaked out or stolen.
deliberate misspelling and use of punctuation in the password.
                                                                                   Table 1 gives the cost and functionality comparison among re-
The average user finds it difficult to remember complex pass-
                                                                                   cent anti-phishing protocols. Table 2 gives the statistics of or-
words. Moreover, most of the users lack motivation and do not
                                                                                   ganization based phishing sites. Table 3 gives the attacks and
understand the need of password security policies. An ideal
                                                                                   countermeasures. Table 4 gives the domains, country domains
password authentication scheme should not store verification
                                                                                   and phishing count.
table directly on the server, allows the user to change password



                                                        Need of                      Need of
                                                                  Need of Need of              Security
                                    Web based           checking                    installing          Dictionary
                                                                  checking checking            ignorant
                                password protocols      browser                     additional            attack
                                                                    URL      GUI                 users
                                                       indicators                    software
                               SSL [36]                   Yes           No          No             No           No          Yes
                               Digest Access [6]          Yes          Yes          No             No           No          Yes
                               PwdHash [9]                Yes           No          No             Yes          No          Yes
                               SRD [11]                   Yes           No          Yes            Yes          No          Yes
                               DSS [12]                   Yes          Yes          Yes            Yes          No          Yes
                               SpoofGuard [1]             Yes          Yes          No             Yes          No          Yes
                               LSOP [21]                  Yes          Yes          Yes            Yes          No          Yes
                               Cache cookies [15]         Yes           No          Yes            No           No          Yes
                               SPP [25]                   Yes          Yes          No             Yes          No          Yes
                           Table 1:	Cost and functionality comparison among different anti-phishing protocols




   Organization                     Phishing sites      Success rate (%)                   Attacks                          Measures
          ebay                            231                   14.8                       Malware          Firewall, Anti-virus, Anti-keylogger & IDS
        paypal                             211                  7.6
                                                                                       Phishing e-mail          Digitally signed e-mail, Bank e-mail
  Bank of America                          28                      2
                                                                                                            Trusted path browser, Browser indicator,
         HSBC                               7                      0                   Bogus web sites
                                                                                                                     Dynamic security skin
       amazon                               4                      4
                                                                                         Identity theft           Smart card, Dynamic identity
Table 2:	Organization based phishing sites
                                                                                   Table 3:	Phishing attacks and their countermeasures



                                      Domain          Phishing count                Country domain         Phishing count
                                       .com                12275                             .in                  252
                                          .biz               353                            .us                   334
                                          .net              2305                            .uk                   1584
                                          .org              1425                            .hk                   2278
                                  Table 4:	Domain, country domain and phishing count



        ing
   earn
                                                                                eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                               n.º 28 • April 2012
 Pap
                                                                                                                                                       5
In-depth

4.	 Future Directions                                                   5.	 Different solutions to thwart online dictionary attacks in
                                                                            authentication protocols have been suggested. These so-
 1.	 Potential scope of research work contains the important
                                                                            lutions include Reverse Turing Tests (RTT), single password
     issues identified as the dynamic identity management,
                                                                            to different accounts, virtual password generation, two
     multi level password verification and two layers based
                                                                            layers based password verification and password based
     password concept so that efficient password authentica-
                                                                            authentication using multi-server environment. Most of
     tion schemes can be designed which satisfy all the security
                                                                            the suggested solutions are vulnerable to dictionary at-
     requirements and achieve the goals of an ideal password
                                                                            tacks, even the most commonly used RTT is vulnerable to
     authentication scheme. An ideal password authentication
                                                                            RTT relay attack. More effective and efficient techniques
     scheme should have protection from eavesdropping, de-
                                                                            are required to thwart online dictionary attacks.
     nial of service, impersonation, parallel session, password
     guessing, replay, stolen smart card, stolen verifier, man-         6.	 The role of cookies can be enhanced in virtual password
     in-the-middle, malicious user, malicious server, phishing,             authentication protocols to preserve the advantages of
     pharming and other feasible attacks relevant to that pro-              basic password authentication and simultaneously in-
     tocol and should achieve mutual authentication.                        creasing the efforts required for online dictionary attacks.
                                                                            The legitimate client can easily authenticate itself to the
 2.	 One of the reasons for success of phishing and dictionary
                                                                            web server from any computer irrespective of whether
     attacks is high rate of password reuse because users tend
                                                                            that computer contains cookie or not. However, the com-
     to use the same password with more and more accounts.
                                                                            putational efforts required from the attacker during login
     Users find it difficult to remember several complex pass-
                                                                            on to the web server increases with each login failure.
     words and hence it is difficult to prevent phishing and
                                                                            Therefore, even the automated programs can not launch
     dictionary attacks. One of the thrust and major area of
                                                                            online dictionary attacks on the proposed protocol.
     research is to find technical solutions for the online pass-
     word management without significantly changing the                 7.	 Single-Sign-On (SSO) provides an environment in which
     user’s behavior.                                                       the client sign in once and are able to access the services
                                                                            offered by different servers under the same administra-
 3.	 Researchers have proposed different anti-phishing tech-
                                                                            tive control. However, the user’s password verification in-
     niques based on the web browser security indicators. The
                                                                            formation stored on the single centralized server is a main
     main reason for the success of phishing attack is that us-
                                                                            point of susceptibility and remains an attractive target
     ers do not constantly notice the presence of a security
                                                                            for the attacker. Therefore, the concept of SSO password
     indicator or find it difficult to understand the meaning
                                                                            based two-server architecture that uses two-server para-
     of these browser based security indicators. Therefore,
                                                                            digm so that password verification information is distrib-
     the web browser must provide an easy to use interface
                                                                            uted between two servers (an authentication server and
     for the users and minimize the efforts in checking the
                                                                            a control server) is more resistant to dictionary attacks as
     browser based security indicators. A solution is required
                                                                            compared to existing single-server password based SSO
     in which the user does not have the need of interpreting
                                                                            authentication protocols.
     the browser based security indicators.
                                                                        8.	 Smart card based password authentication is one of the
 4.	 Researchers have proposed an anti-phishing solution
                                                                            most convenient ways to provide multi-factor authentica-
     based on integration of blacklist into the web browsers.
                                                                            tion for the user by acquiring the smart card and know-
     Therefore, effective techniques must be devised to check
                                                                            ing the identity and password. They are used in financial
     whether a web page is legitimate or a phishing page. It
                                                                            transactions and therefore require secure authentication
     is not easy to provide a mechanism to prevent the us-
                                                                            protocols with high computational and communication
     ers from visiting a phishing site. It is important to detect
                                                                            efficiency. The protocol designer should also take mem-
     phishing pages early because most of them are short
                                                                            ory requirement, number of rounds and time complexity
     lived and do the damage in time span between appearing
                                                                            into consideration.
     online and vanishing.




        ing
   earn
                                                                    eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                         28
                           u
                      ers.e
                  gpap
     www
        .elea
              rnin                                                                                                n.º 28 • April 2012
 Pap
                                                                                                                                    6
In-depth

9.	 A number of static identity based remote user authenti-            7.	Conclusion
    cation schemes have been proposed to improve security,
                                                                       This Corporate network and e-commerce applications require
    efficiency and cost. The static identity leaks out partial
                                                                       secure and practical remote user authentication solutions. Pass-
    information about the user’s authentication messages
                                                                       word based authentication protocols are mainly susceptible to
    to the attacker. On the other hand, the dynamic identity
                                                                       dictionary and phishing attacks. Instances of phishing attacks
    based authentication schemes preserve the user’s ano-
                                                                       are rapidly growing in number. This is sufficient to shake the
    nymity. The dynamic identity is computed from the user
                                                                       confidence of the customers in e-commerce. Naive users find it
    specific parameters and is different for the same user in
                                                                       difficult to understand the security indicators of the web brows-
    each new session of the protocol. Therefore, the dynamic
                                                                       er. Authenticating the user on the web is an essential primitive
    identity based authentication schemes are more suitable
                                                                       and is target of various attacks. In this study, we analyzed cur-
    to e-commerce applications.
                                                                       rently available password authentication schemes over insecure
10.	 In e-commerce, the number of servers providing the                communication channel. Techniques should be devised so that
     services to the user is usually more than one and hence           it will be helpful to naive users in judging out phishing web sites
     secure authentication protocols for multi-server environ-         quickly. That type of protocol can be easily integrated into dif-
     ment are required. The concept of multi-server authenti-          ferent types of services such as banking and enterprise applica-
     cation helps to distribute the user’s verifier information        tions. Cookies are good means to provide weak authentication.
     among different servers. Therefore, the multi-server ar-          SSO authentication is time efficient because it allows the user
     chitecture based authentication protocols make it diffi-          to enter his identity and password once within specific time pe-
     cult for the attacker to find out any significant authentica-     riod to login on to multiple hosts and applications within an or-
     tion information related to the legitimate users. The issue       ganization. The concept of two-tier authentication for the client
     of remote login authentication with smart card in single          makes it difficult for an attacker to guess out the information
     server environment has already been solved by a variety           pertaining to password and ticket. Smart card based password
     of schemes. These conventional single-server password             authentication is one of the most convenient ways to provide
     authentication protocols can not be directly applied to           multi-factor authentication for the communication between
     multi-server environment because each user needs to               a client and a server. User’s privacy is an important issue in e-
     remember different sets of identities and passwords. Re-          commerce applications. Dynamic identity based authentication
     searchers are working in this direction to develop secure         schemes aim to provide the privacy to the user’s identity so that
     and efficient remote user smart card based authentica-            users are anonymous in communication channel. Transaction
     tion protocols for multi-server environment.                      authorization method based on out of band channels like SMS
                                                                       messages was introduced by banks to thwart dictionary and
                                                                       phishing attacks but it requires two separate communication
                                                                       channels. The concept of virtual password authentication proto-
                                                                       col changes the password in each login attempt corresponding
                                                                       to the same client. In future, more computation and commu-
                                                                       nication efficient password authentication schemes should be
                                                                       developed which can resist different attacks in a better way. In
                                                                       this paper, a brief review of the literature on the research topic
                                                                       has been carried out. The scope of the research work has been
                                                                       outlined and the future directions have been listed.




       ing
  earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                                   n.º 28 • April 2012
Pap
                                                                                                                                     7
In-depth


References                                                                 15.	 Juels A., Jakobsson M. and Jagatic T.N., “Cache Cookies
                                                                                For Browser Authentication,” IEEE Symposium on Security
1.	 Stanford, SpoofGuard Home Page, “http://crypto.                             and Privacy, pp. 301-305, May 2006.
    stanford.edu/SpoofGuard/.”, Accessed: February 11, 2011.
                                                                           16.	 Bank of America SiteKey, “http://www.bankofamerica.
2.	 Kirda E. and Kruegel C., “Protecting Users Against Phishing                 com/privacy/sitekey/”, Accessed: May 2, 2010.
    Attacks,” Computer Journal, vol. 49, no. 5, pp. 554-561, January
    2006.                                                                  17.	 Yahoo, “What is a Sign-in Seal? http://yahoo-sign-in.
                                                                                com/?p=31.”, Accessed: November 15, 2010.
3.	 Phishing Filter, Microsoft Phishing Filter FAQ, “https://
    phishingfilter.microsoft.com/faq.aspx/.”, Accessed: January 4,         18.	 Qi F., Li T., Bao F. and Wu Y., “Preventing Web-Spoofing
    2011.                                                                       With Automatic Detecting Security Indicator,” ISPEC,
                                                                                Springer-Verlag, LNCS, vol. 3903, pp. 112-122, April 2006.
4.	 Google Safe Browsing, “http://www.google.com/tools/
    firefox/safebrowsing/.”, Accessed: January 8, 2011.                    19.	 Ludl C., McAllister S., Kirda E. and Kruegel C., “On
                                                                                the Effectiveness of Techniques to Detect Phishing Sites,”
5.	 Mozilla Firefox Phishing Protection, “http://en.www.                        Springer-Verlag, LNCS, vol. 4579, pp. 20-39, May 2007.
    mozilla.com/en/firefox/phishing-protection/.”, Accessed:
    December 3, 2010.                                                      20.	 Microsoft Sender ID home page, “http://www.microsoft.
                                                                                com/mscorp/safety/technologies/senderid/default.mspx/.”,
6.	 RFC 2617, “HTTP Authentication: Basic and Digest Access                     Accessed: November 2, 2010.
    Authentication,” June 1999.
                                                                           21.	 Karlof C., Shankar U., Tygar J.D. and Wagner D.,
7.	 Herzberg A. and Gbara A., “TrustBar: Protecting (Even)                      “Dynamic Pharming Attacks and the Locked Same Origin
    Naive Users from Spoofing and Phishing Attacks,” Cryptology                 Policies For Web Browsers,” Proc. of ACM Conference
    e-print Archive, Report 2004/155, February 2004.                            on Computer and Communications Security, pp. 58-71,
                                                                                November 2007.
8.	 RSA, “RSA Security: Protecting Against Phishing by
    Implementing Strong Two-factor Authentication, https://                22.	 Zhang Y., Egelman S., Cranor L. and Hong J., “Phinding
    www.rsasecurity.com/securid/PHISH_WP_0904.pdf,” June                        Phish: Evaluating Anti-Phishing Tools,” Proc. of 14th Annual
    2004.                                                                       Network & Distributed System Security Symposium (NDSS
                                                                                2007), California, USA, March 2007.
9.	 Ross B., Jackson C., Miyake N., Boneh D. and Mitchell
    J.C., “A Browser Plug-in Solution to the Unique Password               23.	 VeriSign Messaging Security, “http://www.verisign.com”,
    Problem,” Technical Report, Stanford-SecLab, June 2005.                     Accessed: June 23, 2010.

10.	 Pramstaller N., Lamberger M. and Rijmen V “Second.,                   24.	 Adida B., “BeamAuth: Two-Factor Web Authentication With
     Preimages for Iterated Hash Functions and Their Implications               a Bookmark,” Proc. of 14th ACM Conference on Computer
     on MACs,” Proc. of the 12th Australasian Conference on                     and Communications Security, Alexandria, USA, pp. 48-57,
     Information Security and Privacy , ACISP 2007, Springer-                   October 2007.
     Verlag, LNCS, vol. 4586, pp. 68-81, July 2007.
                                                                           25.	 Gouda M.G., Liu A.X., Leung L.M. and Alam M.A.,
11.	 Ye E.Z. and Smith S., “Trusted Paths For Browsers,” ACM                    “SPP: An Anti-Phishing Single Password Protocol,” Computer
     Transactions on Information and System Security, vol. 8, no. 2,            Networks, vol. 51, no. 13, pp. 3715-3726, April 2007.
     pp. 153-186, August 2005.
                                                                           26.	 Yongdong W.U., Yao H. and Bao F., “Minimizing SSO
12.	 Dhamija R. and Tygar J.D., “The Battle Against Phishing:                   Effort in Verifying SSL Anti-phishing Indicators,” Proc. of 23rd
     Dynamic Security Skins,” Symposium on Usable Privacy and                   International Information Security Conference IFIP TC 11,
     Security (SOUPS), pp. 77-88, May 2005.                                     Springer, vol. 278, pp. 47-61, September 2008.

13.	 Adelsbach A., Gajek S. and Schwenk J., “Visual Spoofing               27.	 Netcraft Anti-Phishing Toolbar, “http://www.toolbar.
     of SSL Protected Web Sites and Effective Countermeasures,”                 netcraft.com/.”, Accessed: December 16, 2010.
     Information Security Practice and Experience, Springer-
     Verlag, LNCS, vol. 3469, pp. 204-216, September 2005.                 28.	 SpoofStick, “http://www.spoofstick.com (2005)”, Accessed:
                                                                                April 15, 2009.
14.	 Wu M., Miller R.C. and Garfinkel S., “Do Security
     Toolbars Actually Prevent Phishing Attacks,” Proc. of ACM             29.	 McAfee SiteAdvisor, “http://www.siteadvisor.com/.”,
     Computer/Human Interaction (CHI), pp. 601-610, April 2006.                 Accessed: April 12, 2010.

                                                                           30.	 eBay Toolbar, “http://anywhere.ebay.com/browser/firefox/”,
                                                                                Accessed: Janurary 2, 2011.




       ing
  earn
                                                                       eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                                          n.º 28 • April 2012
Pap
                                                                                                                                              8
In-depth


31.	 Halderman J.A., Waters B. and Felten E.W., “A
     Convenient Method for Securely Managing Passwords,” Proc.
     of 14th ACM International World Wide Web Conference,
     Chiba, Japan, pp. 471-479, May 2005.

32.	 Wu M., Miller R.C. and Garfinkel S., “Do Security
     Toolbars Actually Prevent Phishing Attacks,” Proc. of ACM
     Computer/Human Interaction (CHI), pp. 601-610, April 2006.

33.	 Pinkas B. and Sander T., “Securing Passwords Against
     Dictionary Attacks,” 9th ACM Conference on Computer and
     Communication Security, USA, pp. 161-170, November 2002.

34.	 Lamport L., “Password Authentication With Insecure
     Communication,” Communications of the ACM, vol. 24, no.
     11, pp. 770-772, November 1981.

35.	 Gaw S. and Felten E.W., “Password Management Strategies
     For Online Accounts,” Symposium on Usable Privacy and
     Security (SOUPS) 2006, USA, pp. 44-55, July 2006.




 Edition and production
 Name of the publication: eLearning Papers                          Copyrights
 ISSN: 1887-1542
                                                                    The texts published in this journal, unless otherwise indicated, are subject
 Publisher: elearningeuropa.info
                                                                    to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks
 Edited by: P.A.U. Education, S.L.                                  3.0 Unported licence. They may be copied, distributed and broadcast pro-
 Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain)        vided that the author and the e-journal that publishes them, eLearning
 Phone: +34 933 670 400                                             Papers, are cited. Commercial use and derivative works are not permitted.
 Email: editorial@elearningeuropa.info                              The full licence can be consulted on http://creativecommons.org/licens-
 Internet: www.elearningpapers.eu                                   es/by-nc-nd/3.0/




       ing
  earn
                                                                  eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                                         n.º 28 • April 2012
Pap
                                                                                                                                              9

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine LearningScaleway
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 

Was ist angesagt? (20)

Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Key management
Key managementKey management
Key management
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
User authentication
User authenticationUser authentication
User authentication
 
Phishing
PhishingPhishing
Phishing
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing
PhishingPhishing
Phishing
 
Malicious
MaliciousMalicious
Malicious
 
Cyber security
Cyber securityCyber security
Cyber security
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Ähnlich wie Phishing Attacks: A Challenge Ahead

Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesSarim Khawaja
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...csandit
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...cscpconf
 
Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing TechniquesIRJET Journal
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishingIJCSES Journal
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 

Ähnlich wie Phishing Attacks: A Challenge Ahead (20)

Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 

Mehr von eLearning Papers

OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...eLearning Papers
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...eLearning Papers
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learningeLearning Papers
 
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...eLearning Papers
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...eLearning Papers
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningeLearning Papers
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholareLearning Papers
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentseLearning Papers
 
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GamesReflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GameseLearning Papers
 
SKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GainSKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GaineLearning Papers
 
Experience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetenciesExperience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetencieseLearning Papers
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyeLearning Papers
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...eLearning Papers
 
Website – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolsWebsite – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolseLearning Papers
 
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...eLearning Papers
 
The Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningThe Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningeLearning Papers
 
Checklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContentChecklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContenteLearning Papers
 
The International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningThe International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningeLearning Papers
 
Fostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingFostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingeLearning Papers
 
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning Papers
 

Mehr von eLearning Papers (20)

OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open Scholar
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business Environments
 
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GamesReflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
 
SKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GainSKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence Gain
 
Experience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetenciesExperience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational Competencies
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case Study
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
 
Website – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolsWebsite – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and Schools
 
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
 
The Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningThe Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong Learning
 
Checklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContentChecklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning Content
 
The International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningThe International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong Learning
 
Fostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingFostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active Ageing
 
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
 

Kürzlich hochgeladen

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Phishing Attacks: A Challenge Ahead

  • 1. In-depth Phishing Attacks: A Challenge Ahead Author Password-based authentication is used in online web applications due to its simplic- ity and convenience. Efficient password-based authentication schemes are required Sandeep K. Sood to authenticate the legitimacy of remote users, or data origin over an insecure com- Head & Associate Professor, G.N.D.U. Regional Campus, munication channel. Password-based authentication schemes are highly susceptible to India phishing attacks. san1198@gmail.com Phishing attacks are becoming more and more sophisticated and therefore require strong countermeasures, a task complicated by their elusive nature; phishing sites Tags cause damage in a short time span, going online and vanishing. This type of attack is causing a direct damage to the financial industry and is also affecting the expansion password authentication, of e-commerce. Thus, financial transactions in web applications require highly secure phishing, browser indicators, authentication protocols and need countermeasures against phishing in order to make cookies, dynamic identity online transactions reliable and secure. In this paper, we present a survey of different anti-phishing techniques based on sev- eral crucial criteria. This study will help in developing different password-based anti- phishing authentication techniques for web applications. 1. Introduction Authentication is reliably identifying an entity. It is the most important defence in the secu- rity of a system. The active hackers, dictionary attacks, phishing scams and other malicious threats have brought great challenges and potential threats to online transactions. Authen- tication is essential because the numbers of online transactions are increasing exponentially on the web. The most common verification technique is to check whether claimant pos- sesses some information or characteristics that a genuine entity should possess. Authentica- tion process gets complicated when text, visual or audio clues are not available to verify the identity. Authentication protocols are capable of simply authenticating the user to the con- necting party and vice-versa. The current technologies used in authentication are password, smart card, passphrase, biometrics, public key cryptography, zero knowledge proof, digital signature, SSL/TLS (Secure Socket Layer/ Transport Layer Security), IPsec (IP Security) and secure shell. The selection of an environment appropriate authentication method is one of most crucial decisions in designing secure systems. Phishing is an online identity theft that combines social engineering and website spoofing techniques to cheat the user by redirecting his confidential information to an untrusted destination. The attacker can use this information in online transactions to make an illegal economic profit. In a phishing attack, the attacker sends a large number of spoofed e-mails to random Internet users that appear to be coming from a legitimate business organization such as a bank. The e-mail requests the recipient to update his personal information and also warns that failure to reply the request will result in closure of his online banking account. The victim follows the phishing link provided in the e-mail and is directed to a website that ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 1
  • 2. In-depth is under the control of the attacker. The average user can not 2. Literature Review distinguish a well designed phishing website from the legitimate site because the phishing site is prepared in a manner that imi- To mitigate the risk of phishing attacks, defense mechanisms tates visual characteristics of the target organization’s website have been deployed at both the client and the server sides. by using similar colors, icons, logos and textual descriptions. These solutions include the digitally signed e-mail (S/MIME), Password based authentication is highly susceptible to phishing anti-phishing plug-ins for browsers like SpoofGuard(1), Kirda attacks by exploiting the visual resemblance of domain names and Kruegel’s measures(2), blacklist integration into Internet Ex- to allure the victims (e.g. www.paypai.com instead of actual plorer browser(3), Google safe browsing(4) and Mozilla phishing www.paypal.com). Phishing attacks are increasing despite the protection(5). use of preventive measures like e-mail filters and content analy- In 1999, RFC 2617(6) proposed a Digest Access Authentication sis. The effectiveness of these anti-spam techniques depends scheme that uses a password digest to authenticate a user. In upon many critical factors such as regular filter training. There 2004, Herzberg and Gbara(7) constructed a TrustBar that associ- is still a possibility that some of the phishing e-mails manage ates the logo with the public key certificate of the visited site. to get through the filters and reach the potential victims. The In 2004, SecurID(8) scheme was suggested that uses one-time phishing attacks are becoming more and more sophisticated password for authentication and has been deployed in a num- and therefore require strong countermeasures. It is important ber of financial organizations. In 2005, PwdHash(9) scheme was to detect the phishing sites early because most of them are suggested that authenticates a user with one-way hash(10) on short-lived and cause the damage in the short time span be- <password, domain name> instead of the password only so as tween appearing online and vanishing. Phishing is doing direct to defeat the visual similarity of the domain name. This tech- damage to the financial industry and is also affecting the expan- nique creates a domain specific password that becomes use- sion of e-commerce. less if it is submitted to another domain. However, PwdHash is One of the solutions to counter phishing is to render the brows- susceptible to offline dictionary attack and ineffective against ers with security indicators such as use of https in URL bar, pharming or DNS spoofing attack where the attacker presents locked icon, public key certificate and security warnings. The correct domain name to the browser but redirects the user’s re- main reason for the success of phishing attacks is that average quest to its own server. In 2005, Synchronized Random Dynamic users do not constantly notice the presence of security indica- (SRD)(11) scheme was suggested that is having an internal refer- tors and do not know how to interpret them. A solution is re- ence window, whose color changes randomly and sets up the quired in which the user does not have the need of interpreting boundary of the browser window with different colors accord- the browser based security indicators. ing to certain rules. This scheme is impractical for hand held de- vices and is also ineffective if the attacker creates a bogus refer- Phishing attacks are so powerful that many suggested counter- ence window to overlap the original reference window. In 2005, measures are not very effective. Naive users are easy targets of Dhamija and Tygar(12) proposed a technique that uses Dynamic phishing attacks. Pharming accomplishes same thing as phish- Security Skin (DSS) on the user’s browser. It creates a dedicated ing by using Domain Name Server (DNS) spoofing but without window containing a specific image shared between the user spam e-mail. Here adversary plants false code on DNS itself by and the server for inputting user name and password so as to DNS spoofing attack. Hence anyone entering correct web site defeat a bogus window. In 2005, SpoofGuard(1) technique was address will be directed by DNS to fake site. suggested that examines the domain name, images and links on the web pages and raises an alarm to the users if the site This paper is organized as follows. In next section, we explore has a high probability of being a phishing site. In 2005, Adels- the literature on existing anti-phishing protocols. Then the pa- bach et al.(13) combines different concepts of an adaptive web per discusses the various anti-phishing password protocols in browser toolbar that summarizes all relevant information and terms of security, cost and performance. We present future re- allows user to get required crucial information at a glance. This search directions and finally we conclude the paper. toolbar is a local component of user’s system on client side and hence a remote attacker can not access it by means of active web languages. The main disadvantage of this toolbar scheme is that the user has to recognize his personal image at each login. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 2
  • 3. In-depth In 2006, Wu et al.(14) found that 13-54 % of the users visited the Google. In 2007, Zhang et al.(22) performed a similar study phishing websites, despite the warnings from anti-phishing that tested the detection rates of different blacklist based anti- toolbars. Several browser toolbars like SpoofGuard and TrustBar phishing solutions. Their dataset includes 100 phishing URLs have been proposed to find a pattern in phishing websites and collected over a period of three days in November 2006. They alerts the user if the given site matches the pattern. In 2006, analyzed ten toolbars experimentally and reported that the only Juels et al.(15) suggested the use of cache cookies for the user toolbar consistently identifying more than 90 % of phishing URLs identification and authentication that uses the browser cache also classified 42 % of legitimate URLs incorrectly as phishing. files to identify the browser. These cookies are easy to deploy VeriSign(23) is providing a commercial anti-phishing service. The because it does not require installation of any software on the company is crawling millions of web pages to spot out clones to client side. Then they extended the concept to active cookie identify phishing websites. In 2007, Adida(24) suggested a Frag- scheme, which stores the user’s identification and a fixed IP ad- Token scheme that uses the URL portion as an authenticator dress of the server. During the client’s visits to the server, the and accordingly change response for authentication. FragToken server will redirect the client request to the fixed IP address so is only useful in low security environment like blog because it is as to defeat phishing and pharming attacks. SiteKey has been vulnerable to man-in-the-middle attack. deployed by the bank of America(16) and Yahoo’s sign-in seal(17) In 2007, Gouda et al.(25) proposed an anti-phishing single pass- to prevent a phishing attack. Initially, it recognizes the client’s word protocol that allows the user to choose a single password browser by a previously installed cookie and then requests the of his choice for multiple online accounts on the web. In 2008, user to enter his user name. After successful authentication, a Yongdong et al.(26) proposed SSO anti-phishing technique based user specific image is displayed on the browser. Finally, the user on encrypted cookie that defeats phishing and pharming at- submits his password after recognizing the image displayed on tacks. They mentioned different reasons for web spoofing like the browser to authenticate itself. In 2006, Automatic Detect- self signed certificates or insertion of a spoofed image repre- ing Security Indicator (ADSI)(18) was proposed as an enhance- senting security indicator where one does not exist. Most of the ment of toolbar scheme that generates a random picture and users can not distinguish the spoofed browser’s security indica- embeds it in to the existing web browser. It can be triggered by tors from actual security indicators such as public key certificate, any security related event occurred on browser and then per- URL bar and locked icon. It encrypts the sensitive data with the forms automatic checking on current active security status. In server’s public key and stores this cookie on the user’s comput- case mismatch in embedded images is detected, an alarm goes er. This Encrypted Cookie Scheme (ECS) has advantage that the off to alert the users. ADSI can not prevent man-in-the-middle user can ignore SSL indicator in online transaction procedure. and phishing attacks with self sign certificate. NetCraft Tool Bar(27) is based on risk rating system. Risk is com- In 2007, Ludl et al.(19) analyzed legitimate and phishing websites puted based on the age of domain. This technique uses the to define the metrics that can be used to detect a phishing site. database of phishing sites and hence might not recognize new In 2007, Microsoft deployed Sender ID(20) and Yahoo deployed phishing sites successfully. SpoofStick(28) provides basic domain DomainKeys(17) protocols to detect the phishing e-mails. In information. It will show that you are on paypal.com when you 2007, Karlof et al.(21) proposed the cookies based Locked Same are on paypal site or will display you are on IP address of spoofed Origin Policy (LSOP) that enforces access control for the SSL web site. It is not efficient against spoofed sites opened in multiple objects based on the server’s public key. In 2007, Microsoft in- frames. McAfee SiteAdvisor(29) protects the users from spyware tegrated the blacklisted phishing domains in to the web brows- and ad-ware attacks. It uses the crawler to create a large data- er so that browser refuses to visit these phishing websites. In base of malware and test results on them to provide rating for 2007, Google Safe Browsing uses a blacklist of phishing URLs to a site. This technique will not be able to find new phishing sites. find out a phishing site. This technique can not recognize those The ebay Tool Bar(30) solution is based on “Account Guard” that phishing sites which are not present in the blacklist maintained changes color if the user is on a spoofed site and is specifically by the server. This approach can prevent phishing attack if the designed for ebay and paypal websites. fraudulent sites are discovered and listed quickly. A study car- ried out by the Microsoft in 2007 reported that the Microsoft’s blacklist is superior to the Google’s blacklist. Another study ini- tiated by the Mozilla drew the opposite conclusion in favor of ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 3
  • 4. In-depth 3. Discussion spoofed site. It is not efficient technique against spoofed sites opened in multiple frames. McAfee SiteAdvisor protects the us- Security Requirements ers from spyware and ad-ware attacks. It uses the crawler to create a large database of malware and test results on them to Password is the most commonly used technique to authenticate provide rating for a site. This technique will not be able to find the users on the web. Short and easily memorable passwords new phishing sites. The ebay Tool Bar solution is based on “Ac- are susceptible to attacks on insecure communication channels count Guard” that changes color if the user is on a spoofed site like the Internet. On the other hand, the users find it difficult and is specifically designed for ebay and paypal web sites. to remember long and complex passwords. A common practice adopted by the users is to choose a single strong password and Countermeasures to online dictionary attacks are provided by use it for multiple accounts, instead of choosing a unique pass- Pinkas and Sander(33). Several techniques are available to with- word for each account(31). The attacker can learn the password stand dictionary attacks. Most of the existing password based of a user from a less secure site and reuse it to compromise a authentication schemes are vulnerable to different attacks (e.g. secure site. An insider or a person close to the user has the max- dictionary, phishing, man-in-the-middle) and hence not able imum ability to steal the user’s password because most of the to serve as an ideal password authentication scheme. The fast users chosen passwords are limited to the user’s personal do- development in Internet and web technologies for online ap- main. Therefore, the password based authentication schemes plications such as e-commerce and e-government is increasing are vulnerable to phishing, dictionary, man-in-the-middle and at exponential rate. Once the server authenticates the user’s insider attacks. Hacking and identity thefts are the two main input, web server sends the confidential page to user’s browser concerns in password based authentication protocols. Phish- window. User’s password sent to a server for authentication ing attacks are also increasing significantly in online transac- is subject to phishing attacks. User may have disclosed sensi- tions. Information Technology (IT) companies such as Microsoft, tive data to an adversary during its visit to a fake or unreliable Google, America On Line (AOL) and Opera have recently started server. Security requirements for password based authentica- announcing browser integrated blacklist based anti-phishing so- tion protocol requires resistance against different attacks such lutions. A solution is required to list out the new phishing sites as phishing, dictionary, man-in-the-middle, denial of service, in blacklist database quickly otherwise they will do the damage impersonation, forward secrecy, server spoofing, replay, smart before being included in the blacklist database. Researchers are card loss, stolen-verifier and parallel session and should achieve putting efforts in developing better password based authenti- mutual authentication. cation protocols that should achieve required goals and satisfy security requirements to withstand all possible attack scenarios. Goals In 2006, Wu et al.(32) gave different reasons for web spoofing Most of the user’s finds it difficult to understand security indi- like placing a spoofed image with security indicator even though cators. Researchers are working for effective browser integrat- it does not exist and self signed certificates. Most of users find ed blacklist based solutions and other different techniques to it difficult to interpret browser security indicators correctly and thwart phishing attacks. An adversary can masquerade as a legal clues such as URL bar, locked icon, certificate dialogs and secu- user by stealing user’s identity and password stored in plain text rity warnings. from the password table stored on remote server. Hashed or encrypted passwords can solve this problem. Lamport(34) pro- Google Safe Browsing uses a blacklist of phishing URLs to find posed one-time password with one-way hash function that was out a phishing site. This technique can not recognize those secure against replay attacks. Password reuse rates increases phishing sites which are not present in the black list maintained because people accumulate more accounts but did not create by server. NetCraft Tool Bar is based on risk rating system. Risk more passwords. Researchers have conducted experimental is computed based on the age of domain. This technique uses studies of password use and concluded that people inclined to the database of phishing sites and hence might not recognize pick passwords that represent themselves. Personalized pass- new phishing sites successfully. SpoofStick provides basic do- words such as phone numbers, vehicle number, pet’s name or main information. It will show that you are on paypal.com when a social security number can be cracked given a large enough you are on paypal site or will display you are on IP address of dictionary tries. Gaw et al.(35) give tips and rules for creating ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 4
  • 5. In-depth strong passwords: use of both uppercase and lowercase let- freely, not revealing password to the server, password trans- ters, at least six characters, avoid common literary names, mix mission should not be in clear text, appropriate password for up two or more separate words, create an acronym from an memorization, unauthorized login can be detected quickly and uncommon phrase, avoid passwords that contain login iden- the scheme should be secure even if the secret key of the server tity, use of numbers, dropping of letters from a familiar phrase, is leaked out or stolen. deliberate misspelling and use of punctuation in the password. Table 1 gives the cost and functionality comparison among re- The average user finds it difficult to remember complex pass- cent anti-phishing protocols. Table 2 gives the statistics of or- words. Moreover, most of the users lack motivation and do not ganization based phishing sites. Table 3 gives the attacks and understand the need of password security policies. An ideal countermeasures. Table 4 gives the domains, country domains password authentication scheme should not store verification and phishing count. table directly on the server, allows the user to change password Need of Need of Need of Need of Security Web based checking installing Dictionary checking checking ignorant password protocols browser additional attack URL GUI users indicators software SSL [36] Yes No No No No Yes Digest Access [6] Yes Yes No No No Yes PwdHash [9] Yes No No Yes No Yes SRD [11] Yes No Yes Yes No Yes DSS [12] Yes Yes Yes Yes No Yes SpoofGuard [1] Yes Yes No Yes No Yes LSOP [21] Yes Yes Yes Yes No Yes Cache cookies [15] Yes No Yes No No Yes SPP [25] Yes Yes No Yes No Yes Table 1: Cost and functionality comparison among different anti-phishing protocols Organization Phishing sites Success rate (%) Attacks Measures ebay 231 14.8 Malware Firewall, Anti-virus, Anti-keylogger & IDS paypal 211 7.6 Phishing e-mail Digitally signed e-mail, Bank e-mail Bank of America 28 2 Trusted path browser, Browser indicator, HSBC 7 0 Bogus web sites Dynamic security skin amazon 4 4 Identity theft Smart card, Dynamic identity Table 2: Organization based phishing sites Table 3: Phishing attacks and their countermeasures Domain Phishing count Country domain Phishing count .com 12275 .in 252 .biz 353 .us 334 .net 2305 .uk 1584 .org 1425 .hk 2278 Table 4: Domain, country domain and phishing count ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 5
  • 6. In-depth 4. Future Directions 5. Different solutions to thwart online dictionary attacks in authentication protocols have been suggested. These so- 1. Potential scope of research work contains the important lutions include Reverse Turing Tests (RTT), single password issues identified as the dynamic identity management, to different accounts, virtual password generation, two multi level password verification and two layers based layers based password verification and password based password concept so that efficient password authentica- authentication using multi-server environment. Most of tion schemes can be designed which satisfy all the security the suggested solutions are vulnerable to dictionary at- requirements and achieve the goals of an ideal password tacks, even the most commonly used RTT is vulnerable to authentication scheme. An ideal password authentication RTT relay attack. More effective and efficient techniques scheme should have protection from eavesdropping, de- are required to thwart online dictionary attacks. nial of service, impersonation, parallel session, password guessing, replay, stolen smart card, stolen verifier, man- 6. The role of cookies can be enhanced in virtual password in-the-middle, malicious user, malicious server, phishing, authentication protocols to preserve the advantages of pharming and other feasible attacks relevant to that pro- basic password authentication and simultaneously in- tocol and should achieve mutual authentication. creasing the efforts required for online dictionary attacks. The legitimate client can easily authenticate itself to the 2. One of the reasons for success of phishing and dictionary web server from any computer irrespective of whether attacks is high rate of password reuse because users tend that computer contains cookie or not. However, the com- to use the same password with more and more accounts. putational efforts required from the attacker during login Users find it difficult to remember several complex pass- on to the web server increases with each login failure. words and hence it is difficult to prevent phishing and Therefore, even the automated programs can not launch dictionary attacks. One of the thrust and major area of online dictionary attacks on the proposed protocol. research is to find technical solutions for the online pass- word management without significantly changing the 7. Single-Sign-On (SSO) provides an environment in which user’s behavior. the client sign in once and are able to access the services offered by different servers under the same administra- 3. Researchers have proposed different anti-phishing tech- tive control. However, the user’s password verification in- niques based on the web browser security indicators. The formation stored on the single centralized server is a main main reason for the success of phishing attack is that us- point of susceptibility and remains an attractive target ers do not constantly notice the presence of a security for the attacker. Therefore, the concept of SSO password indicator or find it difficult to understand the meaning based two-server architecture that uses two-server para- of these browser based security indicators. Therefore, digm so that password verification information is distrib- the web browser must provide an easy to use interface uted between two servers (an authentication server and for the users and minimize the efforts in checking the a control server) is more resistant to dictionary attacks as browser based security indicators. A solution is required compared to existing single-server password based SSO in which the user does not have the need of interpreting authentication protocols. the browser based security indicators. 8. Smart card based password authentication is one of the 4. Researchers have proposed an anti-phishing solution most convenient ways to provide multi-factor authentica- based on integration of blacklist into the web browsers. tion for the user by acquiring the smart card and know- Therefore, effective techniques must be devised to check ing the identity and password. They are used in financial whether a web page is legitimate or a phishing page. It transactions and therefore require secure authentication is not easy to provide a mechanism to prevent the us- protocols with high computational and communication ers from visiting a phishing site. It is important to detect efficiency. The protocol designer should also take mem- phishing pages early because most of them are short ory requirement, number of rounds and time complexity lived and do the damage in time span between appearing into consideration. online and vanishing. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 6
  • 7. In-depth 9. A number of static identity based remote user authenti- 7. Conclusion cation schemes have been proposed to improve security, This Corporate network and e-commerce applications require efficiency and cost. The static identity leaks out partial secure and practical remote user authentication solutions. Pass- information about the user’s authentication messages word based authentication protocols are mainly susceptible to to the attacker. On the other hand, the dynamic identity dictionary and phishing attacks. Instances of phishing attacks based authentication schemes preserve the user’s ano- are rapidly growing in number. This is sufficient to shake the nymity. The dynamic identity is computed from the user confidence of the customers in e-commerce. Naive users find it specific parameters and is different for the same user in difficult to understand the security indicators of the web brows- each new session of the protocol. Therefore, the dynamic er. Authenticating the user on the web is an essential primitive identity based authentication schemes are more suitable and is target of various attacks. In this study, we analyzed cur- to e-commerce applications. rently available password authentication schemes over insecure 10. In e-commerce, the number of servers providing the communication channel. Techniques should be devised so that services to the user is usually more than one and hence it will be helpful to naive users in judging out phishing web sites secure authentication protocols for multi-server environ- quickly. That type of protocol can be easily integrated into dif- ment are required. The concept of multi-server authenti- ferent types of services such as banking and enterprise applica- cation helps to distribute the user’s verifier information tions. Cookies are good means to provide weak authentication. among different servers. Therefore, the multi-server ar- SSO authentication is time efficient because it allows the user chitecture based authentication protocols make it diffi- to enter his identity and password once within specific time pe- cult for the attacker to find out any significant authentica- riod to login on to multiple hosts and applications within an or- tion information related to the legitimate users. The issue ganization. The concept of two-tier authentication for the client of remote login authentication with smart card in single makes it difficult for an attacker to guess out the information server environment has already been solved by a variety pertaining to password and ticket. Smart card based password of schemes. These conventional single-server password authentication is one of the most convenient ways to provide authentication protocols can not be directly applied to multi-factor authentication for the communication between multi-server environment because each user needs to a client and a server. User’s privacy is an important issue in e- remember different sets of identities and passwords. Re- commerce applications. Dynamic identity based authentication searchers are working in this direction to develop secure schemes aim to provide the privacy to the user’s identity so that and efficient remote user smart card based authentica- users are anonymous in communication channel. Transaction tion protocols for multi-server environment. authorization method based on out of band channels like SMS messages was introduced by banks to thwart dictionary and phishing attacks but it requires two separate communication channels. The concept of virtual password authentication proto- col changes the password in each login attempt corresponding to the same client. In future, more computation and commu- nication efficient password authentication schemes should be developed which can resist different attacks in a better way. In this paper, a brief review of the literature on the research topic has been carried out. The scope of the research work has been outlined and the future directions have been listed. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 7
  • 8. In-depth References 15. Juels A., Jakobsson M. and Jagatic T.N., “Cache Cookies For Browser Authentication,” IEEE Symposium on Security 1. Stanford, SpoofGuard Home Page, “http://crypto. and Privacy, pp. 301-305, May 2006. stanford.edu/SpoofGuard/.”, Accessed: February 11, 2011. 16. Bank of America SiteKey, “http://www.bankofamerica. 2. Kirda E. and Kruegel C., “Protecting Users Against Phishing com/privacy/sitekey/”, Accessed: May 2, 2010. Attacks,” Computer Journal, vol. 49, no. 5, pp. 554-561, January 2006. 17. Yahoo, “What is a Sign-in Seal? http://yahoo-sign-in. com/?p=31.”, Accessed: November 15, 2010. 3. Phishing Filter, Microsoft Phishing Filter FAQ, “https:// phishingfilter.microsoft.com/faq.aspx/.”, Accessed: January 4, 18. Qi F., Li T., Bao F. and Wu Y., “Preventing Web-Spoofing 2011. With Automatic Detecting Security Indicator,” ISPEC, Springer-Verlag, LNCS, vol. 3903, pp. 112-122, April 2006. 4. Google Safe Browsing, “http://www.google.com/tools/ firefox/safebrowsing/.”, Accessed: January 8, 2011. 19. Ludl C., McAllister S., Kirda E. and Kruegel C., “On the Effectiveness of Techniques to Detect Phishing Sites,” 5. Mozilla Firefox Phishing Protection, “http://en.www. Springer-Verlag, LNCS, vol. 4579, pp. 20-39, May 2007. mozilla.com/en/firefox/phishing-protection/.”, Accessed: December 3, 2010. 20. Microsoft Sender ID home page, “http://www.microsoft. com/mscorp/safety/technologies/senderid/default.mspx/.”, 6. RFC 2617, “HTTP Authentication: Basic and Digest Access Accessed: November 2, 2010. Authentication,” June 1999. 21. Karlof C., Shankar U., Tygar J.D. and Wagner D., 7. Herzberg A. and Gbara A., “TrustBar: Protecting (Even) “Dynamic Pharming Attacks and the Locked Same Origin Naive Users from Spoofing and Phishing Attacks,” Cryptology Policies For Web Browsers,” Proc. of ACM Conference e-print Archive, Report 2004/155, February 2004. on Computer and Communications Security, pp. 58-71, November 2007. 8. RSA, “RSA Security: Protecting Against Phishing by Implementing Strong Two-factor Authentication, https:// 22. Zhang Y., Egelman S., Cranor L. and Hong J., “Phinding www.rsasecurity.com/securid/PHISH_WP_0904.pdf,” June Phish: Evaluating Anti-Phishing Tools,” Proc. of 14th Annual 2004. Network & Distributed System Security Symposium (NDSS 2007), California, USA, March 2007. 9. Ross B., Jackson C., Miyake N., Boneh D. and Mitchell J.C., “A Browser Plug-in Solution to the Unique Password 23. VeriSign Messaging Security, “http://www.verisign.com”, Problem,” Technical Report, Stanford-SecLab, June 2005. Accessed: June 23, 2010. 10. Pramstaller N., Lamberger M. and Rijmen V “Second., 24. Adida B., “BeamAuth: Two-Factor Web Authentication With Preimages for Iterated Hash Functions and Their Implications a Bookmark,” Proc. of 14th ACM Conference on Computer on MACs,” Proc. of the 12th Australasian Conference on and Communications Security, Alexandria, USA, pp. 48-57, Information Security and Privacy , ACISP 2007, Springer- October 2007. Verlag, LNCS, vol. 4586, pp. 68-81, July 2007. 25. Gouda M.G., Liu A.X., Leung L.M. and Alam M.A., 11. Ye E.Z. and Smith S., “Trusted Paths For Browsers,” ACM “SPP: An Anti-Phishing Single Password Protocol,” Computer Transactions on Information and System Security, vol. 8, no. 2, Networks, vol. 51, no. 13, pp. 3715-3726, April 2007. pp. 153-186, August 2005. 26. Yongdong W.U., Yao H. and Bao F., “Minimizing SSO 12. Dhamija R. and Tygar J.D., “The Battle Against Phishing: Effort in Verifying SSL Anti-phishing Indicators,” Proc. of 23rd Dynamic Security Skins,” Symposium on Usable Privacy and International Information Security Conference IFIP TC 11, Security (SOUPS), pp. 77-88, May 2005. Springer, vol. 278, pp. 47-61, September 2008. 13. Adelsbach A., Gajek S. and Schwenk J., “Visual Spoofing 27. Netcraft Anti-Phishing Toolbar, “http://www.toolbar. of SSL Protected Web Sites and Effective Countermeasures,” netcraft.com/.”, Accessed: December 16, 2010. Information Security Practice and Experience, Springer- Verlag, LNCS, vol. 3469, pp. 204-216, September 2005. 28. SpoofStick, “http://www.spoofstick.com (2005)”, Accessed: April 15, 2009. 14. Wu M., Miller R.C. and Garfinkel S., “Do Security Toolbars Actually Prevent Phishing Attacks,” Proc. of ACM 29. McAfee SiteAdvisor, “http://www.siteadvisor.com/.”, Computer/Human Interaction (CHI), pp. 601-610, April 2006. Accessed: April 12, 2010. 30. eBay Toolbar, “http://anywhere.ebay.com/browser/firefox/”, Accessed: Janurary 2, 2011. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 8
  • 9. In-depth 31. Halderman J.A., Waters B. and Felten E.W., “A Convenient Method for Securely Managing Passwords,” Proc. of 14th ACM International World Wide Web Conference, Chiba, Japan, pp. 471-479, May 2005. 32. Wu M., Miller R.C. and Garfinkel S., “Do Security Toolbars Actually Prevent Phishing Attacks,” Proc. of ACM Computer/Human Interaction (CHI), pp. 601-610, April 2006. 33. Pinkas B. and Sander T., “Securing Passwords Against Dictionary Attacks,” 9th ACM Conference on Computer and Communication Security, USA, pp. 161-170, November 2002. 34. Lamport L., “Password Authentication With Insecure Communication,” Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981. 35. Gaw S. and Felten E.W., “Password Management Strategies For Online Accounts,” Symposium on Usable Privacy and Security (SOUPS) 2006, USA, pp. 44-55, July 2006. Edition and production Name of the publication: eLearning Papers Copyrights ISSN: 1887-1542 The texts published in this journal, unless otherwise indicated, are subject Publisher: elearningeuropa.info to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks Edited by: P.A.U. Education, S.L. 3.0 Unported licence. They may be copied, distributed and broadcast pro- Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain) vided that the author and the e-journal that publishes them, eLearning Phone: +34 933 670 400 Papers, are cited. Commercial use and derivative works are not permitted. Email: editorial@elearningeuropa.info The full licence can be consulted on http://creativecommons.org/licens- Internet: www.elearningpapers.eu es/by-nc-nd/3.0/ ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 9