An Enhanced Countermeasure Technique for Deceptive Phishing Attack
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering methods such as messages and emails to make the users to disclose their sensitive information such as personal details, username password, etc. The strong techniques are required to avoid fraudulent fund attacks. In the proposed work Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the attackers. Multi Factor Authentication technique authenticates the users using users finger print image recognition and secret question answer. After successful authentication of user using Multi Factor Authentication technique, session key generated using Gaussian distribution is sent to users mobile phone. User proceeds with the transaction only after entering the session key received. Every time user attempts their authentication the counter measure will perform and made action when user attempt more than 3 times. By incorporating above mentioned techniques users can perform online transactions safely and securely.

Keywords: Authentication, Phishing, MFA, Counter Measure, Banking

Edition: Volume 4 Issue 9, September 2015

Pages: 802 - 806

Share this Article

How to Cite this Article?

K. Selvan, Dr. M. Vanitha, "An Enhanced Countermeasure Technique for Deceptive Phishing Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158140, Volume 4 Issue 9, September 2015, 802 - 806

54 PDF Views | 51 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2302 - 2305

Authentication Using Text and Graphical Password

Mayur H Patel, Nimit S Modi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1312 - 1317

A Review on Auditing in Cloud

MS Tanuja Sali

Share this Article

Similar Articles with Keyword 'Phishing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2323 - 2328

An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation

Komatla. Sasikala, P. Anitha Rani

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 112 - 116

Enhanced Framework for Detecting Malicious HTTP Redirections with Supporting Classifier

Thella Vineela, Bondili Balvinder Singh

Share this Article

Similar Articles with Keyword 'MFA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1593 - 1599

A Survey of Digital Image Watermarking Optimization Algorithms Inspired by Nature

Komal Sinsinwar, SPS Chauhan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 802 - 806

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

Share this Article

Similar Articles with Keyword 'Counter Measure'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2196 - 2199

A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle

Jyoti B. Shende, S. V. Todkari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 373 - 376

Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud

J. Sasi Devi, R. Sugumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2620 - 2623

Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network

Anju Shukla, Prachi Damodhar Shahare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 802 - 806

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

Share this Article

Similar Articles with Keyword 'Banking'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2257 - 2261

Virus Detection System for Android Using ANN

Harshada S. Palve, Vrunda K. Bhusari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

Research Paper, Computer Science & Engineering, Nigeria, Volume 6 Issue 7, July 2017

Pages: 1704 - 1708

Biometric Security Transaction in Banking System: The Automated Teller Machine (ATMs) in View

Ogah U. S., Ahmed A. M., Adamu G. M.

Share this Article
Top