Skip to main content

2022 | OriginalPaper | Buchkapitel

Prevention of Phishing Attacks Using QR Code Safe Authentication

verfasst von : M. Taraka Rama Mokshagna Teja, K. Praveen

Erschienen in: Inventive Computation and Information Technologies

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing is a type of attack in which attackers obtain personal information such as usernames, passwords, credit card information, and network credentials. They deceive victims by impersonating a reputable individual or entity and conducting specific acts, such as clicking on a harmful connection or attachment or intentionally revealing sensitive information over the phone or through email. In general, phishing sites attempt to deceive victims by pretending they are on a legitimate website to steal their account credentials and other sensitive information. In this paper, we implemented a safe authentication system using secret-key sharing and QR codes. This authentication system has a dedicated mobile application for authentication, which will eliminate the process of entering the website’s credentials and as a result, it will provide robustness for phishing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat P. Kieseberg, et al., QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (2010) P. Kieseberg, et al., QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (2010)
6.
Zurück zum Zitat S. Sheng, et al., Anti-phishing Phil: the design and evaluation of a game that teaches people not to fall for phish, in Proceedings of the 3rd Symposium on Usable Privacy and Security (2007) S. Sheng, et al., Anti-phishing Phil: the design and evaluation of a game that teaches people not to fall for phish, in Proceedings of the 3rd Symposium on Usable Privacy and Security (2007)
7.
Zurück zum Zitat S. Smys, J.S. Raj, Analysis of deep learning techniques for early detection of depression on social media network-A comparative study. J. Trends Comput. Sci. Smart Technol. (TCSST) 3(01), 24–39 (2021) S. Smys, J.S. Raj, Analysis of deep learning techniques for early detection of depression on social media network-A comparative study. J. Trends Comput. Sci. Smart Technol. (TCSST) 3(01), 24–39 (2021)
8.
Zurück zum Zitat S. Aparna, K. Muniasamy, Phish indicator: an indication for phishing sites, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (Springer, New Delhi, 2015), pp. 481–487 S. Aparna, K. Muniasamy, Phish indicator: an indication for phishing sites, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (Springer, New Delhi, 2015), pp. 481–487
9.
Zurück zum Zitat H. Yao, D. Shin, Towards preventing qr code based attacks on android phone using security warnings, in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (2013) H. Yao, D. Shin, Towards preventing qr code based attacks on android phone using security warnings, in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (2013)
10.
Zurück zum Zitat G. Ranganathan, Real time anomaly detection techniques using PYSPARK frame work. J. Artif. Intell. 2(01), 20–30 (2020) G. Ranganathan, Real time anomaly detection techniques using PYSPARK frame work. J. Artif. Intell. 2(01), 20–30 (2020)
11.
Zurück zum Zitat S.A. Robila, J.W. Ragucci, Don’t be a phish: steps in user education. ACM SIGCSE Bullet. 38(3), 237–241 (2006)CrossRef S.A. Robila, J.W. Ragucci, Don’t be a phish: steps in user education. ACM SIGCSE Bullet. 38(3), 237–241 (2006)CrossRef
12.
Zurück zum Zitat A.A. Athulya, K. Praveen, Towards the detection of phishing attacks, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (IEEE, 2020), p. 48184 A.A. Athulya, K. Praveen, Towards the detection of phishing attacks, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (IEEE, 2020), p. 48184
13.
Zurück zum Zitat V. Muppavarapu, A. Rajendran, S.K. Vasudevan, Phishing detection using RDF and random forests. Int. Arab J. Inf. Technol. 15(5), 817–824 (2018) V. Muppavarapu, A. Rajendran, S.K. Vasudevan, Phishing detection using RDF and random forests. Int. Arab J. Inf. Technol. 15(5), 817–824 (2018)
14.
Zurück zum Zitat G. Ramesh, K. Selvakumar, A. Venugopal, Intelligent explanation generation system for phishing webpages by employing an inference system. Behaviour Inf. Technol. 36(12), 1244–1260 (2017)CrossRef G. Ramesh, K. Selvakumar, A. Venugopal, Intelligent explanation generation system for phishing webpages by employing an inference system. Behaviour Inf. Technol. 36(12), 1244–1260 (2017)CrossRef
15.
Zurück zum Zitat K. Choi, et al., A mobile based anti-phishing authentication scheme using QR code, in International Conference on Mobile IT Convergence (IEEE, 2011) K. Choi, et al., A mobile based anti-phishing authentication scheme using QR code, in International Conference on Mobile IT Convergence (IEEE, 2011)
16.
Zurück zum Zitat M. Eminagaoglu, et al., A two-factor authentication system with QR codes for web and mobile applications, in 2014 Fifth International Conference on Emerging Security Technologies (IEEE, 2014) M. Eminagaoglu, et al., A two-factor authentication system with QR codes for web and mobile applications, in 2014 Fifth International Conference on Emerging Security Technologies (IEEE, 2014)
17.
Zurück zum Zitat B. Rodrigues, A. Chaudhari, S. More, Two factor verification n using QR-code: a unique authentication system for Android smartphone users, in 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (IEEE, 2016) B. Rodrigues, A. Chaudhari, S. More, Two factor verification n using QR-code: a unique authentication system for Android smartphone users, in 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (IEEE, 2016)
18.
Zurück zum Zitat M.H. Barkadehi, et al., Authentication systems: a literature review and classification. Telemat. Inform. 35(5), 1491–1511 M.H. Barkadehi, et al., Authentication systems: a literature review and classification. Telemat. Inform. 35(5), 1491–1511
19.
Zurück zum Zitat K. Abhishek, et al., A comprehensive study on multifactor authentication schemes, in Advances in Computing and Information Technology (Springer, Berlin, Heidelberg, 2013), pp. 561–568 K. Abhishek, et al., A comprehensive study on multifactor authentication schemes, in Advances in Computing and Information Technology (Springer, Berlin, Heidelberg, 2013), pp. 561–568
20.
Zurück zum Zitat A. Bruun, K. Jensen, D. Kristensen, Usability of single-and multi-factor authentication methods on tabletops: a comparative study, in International Conference on Human-Centered Software Engineering (Springer, Berlin, Heidelberg, 2014) A. Bruun, K. Jensen, D. Kristensen, Usability of single-and multi-factor authentication methods on tabletops: a comparative study, in International Conference on Human-Centered Software Engineering (Springer, Berlin, Heidelberg, 2014)
Metadaten
Titel
Prevention of Phishing Attacks Using QR Code Safe Authentication
verfasst von
M. Taraka Rama Mokshagna Teja
K. Praveen
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-6723-7_27