An Anti Phishing Framework For Blocking Service Attacks Using Visual Cryptography

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - October Issue 2013 by IJCTT Journal
Volume-4 Issue-10                           
Year of Publication : 2013
Authors :Mary Ruby Star .A.L. , T.Venu

MLA

Mary Ruby Star .A.L. , T.Venu"An Anti Phishing Framework For Blocking Service Attacks Using Visual Cryptography"International Journal of Computer Trends and Technology (IJCTT),V4(10):3618-3622 October Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:-  In today’s environment internet communication become a massive in use. Peoples made communication with other people as well as with the business organization through internet. Most of the time they transfer their sensitive information through internet .Sensitive information such as userid, Password, account information, credit card information etc are important information of a person. For getting those sensitive information from internet Fishing become popular in recent time. Fishing is a technique by which an individual or a group of individual can thieve personal confidential information like password, account information etc from unidentified victims for identity information, financial information or for other fraudulent activities on internet. For securing our information from fishing attack we are proposing here a new technique or framework which is based on visual cryptography technique. Visual cryptography is a cryptographic technique which allow information like image, text etc to be made encrypted in such a form and break the image in number of part and each part having its own part of information .These breaked image can be distributed to n number of user and until unless all part of image will not summarized no one can get the information. By using this technique we can pass the sensitive information like password through visual cryptography. In our proposed framework the original image captcha will divided into two parts and each part is stored into different servers such that the original image captcha can be made only when both parts are available, the single part can not create the original image captcha. Once the original image captcha is there then user can use it as the key to his account.

 

References -

[1]Sun Bin.; Wen Qiaoyan.; Liang Xiaoying.; "A DNS based Anti-Phishing Approach," in Proceedings of IEEE- Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
[2]Nourian, A.; Ishtiaq, S.; Maheswaran, M.; "CASTLE: A social framework for collaborative antiphishing databases", in Proceedings of IEEE- 5th International Conference on CollaborativeComputing:Networking, Applications and Worksharing, 2009.
[3]Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS,p495-506, 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings.
[4]Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover?s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3, n 4, p301-311, October/December 2006.
[5]M. Bose and R. Mukerjee, “Optimal visual cryptographic schemes for general ,” Designs, Codes, Cryptography.
[6]C. Blundo, P. D?Arco, A. De Santis, and D. R. Stinson, “Contrast optimal threshold visual cryptography schemes,”.
[7]C. Blundo, A. De Santis, and D. R. Stinson, “On the contrast in visualcryptography schemes,” J. Cryptology.

Keywords :— Thrawrting,Phishing, visual cryptography, image captcha.