Protecting web users from phishing , spoofing and malware
نویسنده
چکیده
We describe the current state of web security, and identify the main problems. We then present proposals for improvements, including: secure site identification widget; secure and convenient`single click logon`; improved validation certificates; and using public-key signatures and automated resolutions and penalties, to defend against malicious content including malware. The web and its users are suffering from a growing amount and different forms of malicious, criminal abuses, despite the deployment of sophisticated cryptographic protocols (SSL/TLS). We believe that modest improvements to browser security indicators and mechanisms, can prevent many of these abuses, including many of the phishing, spoofing, malware and cross-site scripting attacks. These proposals focus on secure usability aspects, and should make browsing easier rather than more cumbersome; and the performance requirements are modest. Our discussion is largely based on experience and conclusions from developing TrustBar [HG04], an improved security indicator extension to the FireFox browser, including feedback received from users, surveys and empirical data collected. The importance of security to web users and services is obvious, and indeed essentially all browsers and almost all web servers support advanced, public-key cryptographic protocols, mainly the Secure Socket Layer (SSL) protocol (or its standard version, the Transaction Layer Security (TLS) standard); for details see e.g. [R00]. The main goal of SSL it to protect sensitive traffic, such as credit card numbers and passwords, sent by a consumer to web servers (e.g. merchant sites and e-banking logon pages). Simplified description of SSL as used in most sites. SSL operation is divided into two phases: a handshake phase and a data transfer phase. We illustrate this in Figure 2, for connection between a client and an imaginary bank site During the handshake phase, the browser confirms that the server has a domain name public key certificate. Such a certificate is a statement signed (digitally) by a trusted entity, called a Certificate Authority (CA), specifying a public key PKserver and authorizing it to use the domain name www.bank.com contained in the specified web
منابع مشابه
Browsers Defenses against Phishing, Spoofing and Malware 1 Ssl-based Logon
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.
متن کاملA Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to detect and prevent real-time phishing attacks. It uses 2-way authentication and zero-knowledge password proof. Users are recommended to customize their user in...
متن کاملUsing one-time passwords to prevent password phishing attacks
Phishing is now a serious threat to the security of Internet users’ confidential information. Basically, an attacker (phisher) tricks people into divulging sensitive information by sending fake messages to a large number of users at random. Unsuspecting users who follow the instruction in the messages are directed to well-built spoofed web pages and asked to provide sensitive information, which...
متن کاملPUBCRAWL: Protecting Users and Businesses from CRAWLers
Web crawlers are automated tools that browse the web to retrieve and analyze information. Although crawlers are useful tools that help users to find content on the web, they may also be malicious. Unfortunately, unauthorized (malicious) crawlers are increasingly becoming a threat for service providers because they typically collect information that attackers can abuse for spamming, phishing, or...
متن کاملPhishing on Mobile Devices
We assess the risk of phishing on mobile platforms. Mobile operating systems and browsers lack secure application identity indicators, so the user cannot always identify whether a link has taken her to the expected application. We conduct a systematic analysis of ways in which mobile applications and web sites link to each other. To evaluate the risk, we study 85 web sites and 100 mobile applic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006