Details



INTERNET BANKING PROTOCOLS AND SECURITY RISKS- DEVELOPING AN INTEGRATED MODEL TO MITIGATE PHISHING AND BUILD SECURITY SAFEGUARDS IN E-TRANSACTON PROCESSES

Divyashi Agrawal

51-63

Vol 7, Jan-Jun, 2018

Date of Submission: 2018-02-14 Date of Acceptance: 2018-03-10 Date of Publication: 2018-03-19

Abstract

Recognizing and distinguishing any phishing sites continuously, especially for e-keeping money, is extremely an unpredictable and dynamic issue including numerous components and criteria. As a result of the abstract contemplations and the ambiguities engaged with the location, information mining strategies can be a successful device in surveying and recognizing phishing sites for e-saving money since it offers a more characteristic method for managing quality factors instead of correct qualities. This paper introduces the validation condition characterized for anchoring E show has been intended to be effortlessly material with least in key purpose of this model is the requirement for multifaceted common confirmation, rather than essentially constructing the security in light of the computerized authentication of the monetary element, since much of the time clients are not ready to and may not focus on it. By ensuing the tenets characterized in this proposition, the security level of the Web Banking condition will increment and clients' trust will be upgraded, in this way permitting a more useful utilization of this administration.

References

  1. Alnajim A, Munro M. An evaluation of users’ tips effectiveness for phishing websites detection, 978-1-4244- 2917-2/08,IEEE; 2008. p. 63–68.
  2. APWG. Phishing activity trends report.2005. http://antiphishing.org/reports/apwg_report_DEC2005_FINApdf. Accessed 12 Apr 2007
  3. APWG. Phishing activity trends report.2008.http://antiphishing.org/reports/apwg_report_sep2008_final.pdf Accessed 9 March2009.
  4. Proceeding of the 11th annual Network and Distributed System Security Symposium (NDSS ‘04); 2004.
  5. Dhamija R, Tygar J. The battle against phishing: dynamic security skins. In: Proceedings of ACM Symposium on Usable Security and Privacy (SOUPS 2005); 2005 .p. 77–88.
  6. Dhamija R, Tygar J, Marti H. Why phishing works. In: CHI ‘06: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York;2006. p. 581– 590.
  7. FDIC. Putting an end to account-hijacking identity theft, FDIC, Technical Report[Online]. 2004. Available:http://www.fdic.gov/consumers/consumer/idtheftstudy/identitytheft.pdf. Accessed 18 Apr 2007.
  8. Anti-Phishing Working Group. Phishing Activity Trends Report. June, 2006.http://www.antiphishing.org/reports/apwg_report_june_06.pdf
  9. CallingID, Ltd. Accessed: December 1,2006.http://www.callingid.com/DesktopSolutions/ CallingIDToolbar.aspx
  10. Chou, Neil, Robert Ledesma, YukaTeraguchi, Dan Boneh and John C.Mitchell, “Client-Side Defense against Web-Based Identity Theft,” in Proceedings of The 11th Annual Network and Distributed System Security Symposium (NDSS '04),San Diego, CA February, 2004.http://crypto.stanford.edu/SpoofGuard/webspoof.pdf.
  11. Cloudmark, Inc. Accessed: September 5,2006. http://www.cloudmark.com/desktop/download/.
  12. Computer Crime Research Center.“Netscape: Anti-Phishing Bundled.”February 2, 2005. Accessed: November 9,2006. http://www.crimeresearch.org/news/02.02.2005/938/.
  13. APWG.2009.http://www.apwg.org/reports/APWG_GlobalPhishing Survey_1H2009.pdf. Accessed 8 Aug 2009.
  14. Brooks J. Anti-phishing best practices: keys to aggressively and effectively protecting your organization from phishing attacks, White Paper, Cyveillance; 2006.
  15. Business Security Guidance. How to protect insiders from social engineering threats. 2006. www.microsoft.com/technet/security/default.mspx. Accessed 8 Apr 2006.
  16. Chou N, Ledesma R, Teraguchi Y, BonehD, Mitchell J. Client side defense against web-based identity theft.
Download PDF
Back