PHISHING ATTACK & COUNTER MEASURES
#1

[attachment=13480]
PHISHING ATTACK & COUNTER MEASURES
INTRODUCTION

Coined in 1996 by computer hackers.
Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords and/or credit card information.
In a typical phishing attack a user will receive an e-mail message impersonated to be sent by a financial institution.
1%-20% users respond to such attacks.
PHISHING ATTACKS
Phishing attacks are combined with malicious code attacks such as Mimail, Bank Withdrawal Trojan, Mydoom.m worm etc
In such blended attacks these virus/worms carry the payloads which harness email addresses from the internet and affected systems and further launch phishing attacks.
PHISHING EXAMPLES Example 1.
Example 2.
PHISHING TRENDS
APWG is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing.
This group provides forums to discuss phishing issues, trials and evaluations of potential technology solutions.
Publish Phishing Attack Trends Report
TECHNOLOGICAL SOLUTIONS
Ultimate solution is training the end users not to reveal any sensitive information.
Basic approach for an effective anti-phishing effort includes detection, prevention and awareness.
Counter measures are in the form of technological solutions, policy guidelines and user awareness.
Anti-phishing solution includes:
Detection: scanning, flitering and alerting
Mail server authentication
Secure web-authentication
Digitally signed e-mail
Mail gateway filtering
Desktop filtering
Secure web-authentication
Digitally signed e-mail
Other counter-measures are:
Changes in policy of financial institutions
User awareness
Anti-phishing techniques
CONCLUSION
The phishing attacks are major threat to e-commerce and e-banking applications. The scammers are making huge losses by stealing financial data from the users. There is need for adoption of counter-measure steps by the financial institutions and individual customers for fighting phishing attacks. Digital signature usage should be promoted for secure mail transactions.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: phishing abstract for cse students, advantage of phishing, advantages disadvantages phishing, abstract for phishing, phishing attack ppt in manet, phishing topic for seminar, disadvantage of phishing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
PHISHING ATTACK & COUNTER MEASURES - by seminar class - 09-05-2011, 03:43 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  A New Cell-Counting-Based Attack against Tor 1 749 14-02-2017, 11:26 AM
Last Post: ijasti
  DEFENDING SYN ATTACK IN TCP USING CRYPTOGRAPHY nit_cal 1 1,931 30-10-2012, 04:56 PM
Last Post: Guest
  Captcha security for phishing smart paper boy 2 2,488 18-10-2012, 01:15 PM
Last Post: seminar details
  MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE seminar surveyer 3 3,340 26-01-2012, 10:19 AM
Last Post: seminar addict
  Dynamic Security Risk Management Using Bayesian Attack Graphs Projects9 1 1,607 23-01-2012, 11:40 AM
Last Post: seminar addict
  Survivability Experiment and Attack Characterization for RFID Projects9 0 744 20-01-2012, 06:28 PM
Last Post: Projects9
  Extending Attack Graph-Based Security Metrics and Aggregating Their Application Projects9 0 703 20-01-2012, 05:59 PM
Last Post: Projects9
  Social Security and Welfare Measures which are implementing in HMT Bearings smart paper boy 0 1,284 29-08-2011, 11:21 AM
Last Post: smart paper boy
  Attack Scenarios Construction and Automated Report Generation in SACHET Intrusion computer science crazy 0 818 10-08-2011, 01:55 PM
Last Post: computer science crazy
  Large-Scale Automatic Classification of Phishing Pages seminar class 0 865 04-05-2011, 03:06 PM
Last Post: seminar class

Forum Jump: