The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Secure Internet Banking Authentication
IEEE Security and Privacy
Protecting people from phishing: the design and evaluation of an embedded training email system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Cantina: a content-based approach to detecting phishing web sites
Proceedings of the 16th international conference on World Wide Web
Learning to detect phishing emails
Proceedings of the 16th international conference on World Wide Web
Stronger password authentication using browser extensions
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Password rescue: a new approach to phishing prevention
HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection
WKDD '10 Proceedings of the 2010 Third International Conference on Knowledge Discovery and Data Mining
A Sophisticated RFID Application on Multi-Factor Authentication
ITNG '11 Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations
Phoolproof phishing prevention
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
Phishing is a fraudulent technique used by attackers known as phishers for obtaining credentials (username and passwords) of a specific or group of users on internet. Phishing came into focus in 1996, and from then it is emerging out as one of the biggest cybercrime attacks on internet. The solutions for handling phishing attacks include: detecting the activity and filtering it from normal activity (Phished Email and Website detection), preventing it by the use of excellent user interfaces and login authentication schemes and user training so that users can prevent themselves from being falling into it. Researchers have focused on all the three techniques for solving phishing attacks. However the previous techniques handle the problem of phishing to an extent but are incomplete, and complex to implement or use in actuality. The research work in this paper will be focused on the critical review of previous schemes proposed, with a novel scheme for preventing phishing attacks with the use of four characters secret information display during login authentication. The novelty of the scheme lies in its low complexity, better user understandability and real time implementation ability. This paper also describes the analyzed results of a real time experiment done to evaluate the scheme. Our results show great improvement with a total of only 13.5%, 1% and 3% user's phished in rigorous phishing attempts, of various kinds for a period of one month.