Open Access Open Access  Restricted Access Subscription or Fee Access

Simple Password Protector

I. Rajasekhar, M. Srikanth, M. Sreelatha, M. Shashi

Abstract


Phishing attacks use email or malicious websites to get personal information by acting as a trustworthy organization. Users are tricked into disclosing their information either by providing it through a web form or by downloading and installing hostile software. The attacker can then use this information for identity theft or fraud. This paper proposes an antiphishing tool. Password protector is described as a browser extension tool, which transparently produces a different password to improve the security of passwords and defend against phishing. This tool appends some generated secret hash code to the original password that converts the original password into secure password.

Keywords


Phishing Attack, Antiphishing, Security, Browser Extension, Secret Hash Code

Full Text:

PDF

References


R.Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In ACM Symposiumon Usable Security and Privacy (SOUPS ’05), July 2005.

Min Wu et al, Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Symposium On Usable Privacy and Security (SOUPS) 2006, July 12-14, 2006, Pittsburgh, PA, USA.

PassMark Security. Two-Factor Two-Way Authentication. http://www.passmarksecurity.com/

Yue Zhang et al ,CANTINA: A Content-Based Approach to Detecting Phishing Web Sites WWW 2007, May 8–12, 2007, Banff, Alberta, Canada. ACM 978-1-59593-654-7/07/0005.

Passmark Security. Protecting your customers from phishing attacks: an introduction to passmarks. http://www.passmarksecurity.com/, 2005.

Neil Chou et al Famework for client-side defense:spoofguard.

P. K. Sengar and Vijay Kumar , Client-Side Defense against Phishing with PageSafe.

8. Yue, C. and Wang, H. 2010. BogusBiter: A transparent protection against phishing attacks. ACM Trans. Internet Technol. 10, 2, Article 6 (May 2010), 31 pages.DOI=10.11 45/ 1754393.1754395http://doi.acm.org/10.1145/1754393.1754395.

Inturi Sirisha, C. ShobhaBindu,,2011.―Sentry: Transforming Phishing Detection into Automatic Fraud Protection.‖In Proceedings of International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No.2, pp.545-547.

B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th USENIX Security Symposium, Baltimore, August 2005.

J. Halderman, B. Waters, and E. Felten. A convenient method for securely managing passwords. In Proceedings of the 14th International World Wide Web Conference, 2005.

Xun Dong et al : Defending the weakest link: phishing websites detection by analysing user behaviours.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.