International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015


An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan | Dr. M. Vanitha [2]


Abstract: The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering methods such as messages and emails to make the users to disclose their sensitive information such as personal details, username password, etc. The strong techniques are required to avoid fraudulent fund attacks. In the proposed work Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the attackers. Multi Factor Authentication technique authenticates the users using users finger print image recognition and secret question answer. After successful authentication of user using Multi Factor Authentication technique, session key generated using Gaussian distribution is sent to users mobile phone. User proceeds with the transaction only after entering the session key received. Every time user attempts their authentication the counter measure will perform and made action when user attempt more than 3 times. By incorporating above mentioned techniques users can perform online transactions safely and securely.


Keywords: Authentication, Phishing, MFA, Counter Measure, Banking


Edition: Volume 4 Issue 9, September 2015,


Pages: 802 - 806


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

K. Selvan, Dr. M. Vanitha, "An Enhanced Countermeasure Technique for Deceptive Phishing Attack", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 802-806, https://www.ijsr.net/get_abstract.php?paper_id=SUB158140

Similar Articles with Keyword 'Authentication'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top