An Enhanced Countermeasure Technique for Deceptive Phishing Attack
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering methods such as messages and emails to make the users to disclose their sensitive information such as personal details, username password, etc. The strong techniques are required to avoid fraudulent fund attacks. In the proposed work Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the attackers. Multi Factor Authentication technique authenticates the users using users finger print image recognition and secret question answer. After successful authentication of user using Multi Factor Authentication technique, session key generated using Gaussian distribution is sent to users mobile phone. User proceeds with the transaction only after entering the session key received. Every time user attempts their authentication the counter measure will perform and made action when user attempt more than 3 times. By incorporating above mentioned techniques users can perform online transactions safely and securely.

Keywords: Authentication, Phishing, MFA, Counter Measure, Banking

Edition: Volume 4 Issue 9, September 2015

Pages: 802 - 806

Share this Article

How to Cite this Article?

K. Selvan, Dr. M. Vanitha, "An Enhanced Countermeasure Technique for Deceptive Phishing Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158140, Volume 4 Issue 9, September 2015, 802 - 806

163 PDF Views | 131 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Similar Articles with Keyword 'Phishing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Similar Articles with Keyword 'MFA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1593 - 1599

A Survey of Digital Image Watermarking Optimization Algorithms Inspired by Nature

Komal Sinsinwar, SPS Chauhan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 802 - 806

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

Share this Article

Similar Articles with Keyword 'Counter Measure'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2196 - 2199

A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle

Jyoti B. Shende, S. V. Todkari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2620 - 2623

Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network

Anju Shukla, Prachi Damodhar Shahare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 373 - 376

Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud

J. Sasi Devi, R. Sugumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 802 - 806

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

Share this Article

Similar Articles with Keyword 'Banking'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2888 - 2890

Use of Advanced Encryption Standard to Enhance the Performance of Geo Protocol in Location Based Network

Pranjala G Kolapwar, Prof. H. P. Ambulgekar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1876 - 1882

Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment

Dr. K. Suresh Babu, Gardas Pavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1183 - 1187

Memory Management in BigData

Yanish Pradhananga, Shridevi C. Karande

Share this Article
Top