SEFAP: An email system fox anti-phishing

被引:2
|
作者
Ren, Qiong [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
anti-phishing; malicious email; digital signature;
D O I
10.1109/ICIS.2007.162
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
More and more users are suffering from entail-based phishing attacks over the past years. Despite the use of various technologies for anti-phishing, phishing is still one of most serious attacks against Internet users. Email phishing attacks fabricate the email's origin. Unfortunately, current email server systems can not authenticate the genuineness of in-coming emails. In this paper, we present a novel antiphishing mechanism: Signed Email for Anti-Phishing (SEFAP), designed to automatically identify an email's origin to mitigate email phishing attacks. The SEFAP system is an extendable secure cryptographic system that accommodates multiple signature schemes. SEFAP can adopt any signature scheme which has two properties: Identity-based and repudiability. Identity-based property removes the unrealistic full PKI infrastructure deployment requirement and the repudiability property protects sender's privacy. We describe how to integrate the SEFAP system into a standard SMTP server. We also proposed an, efficient implementation based on a novel ID-based ring signature scheme.
引用
收藏
页码:782 / +
页数:2
相关论文
共 50 条
  • [1] Email Anti-Phishing Detection Application
    Helmi, Rabab Alayham Abbas
    Ren, Chua Shang
    Jamal, Arshad
    Abdullah, Muhammad Irsyad
    [J]. 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 264 - 267
  • [2] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    [J]. FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [3] Hybrid Model of Phishing Email Detection: A Combination of Technical and Non-Technical Anti-Phishing Approaches
    Al-Daeef, Melad Mohamed
    Basir, Nurlida
    Saudi, Madihah Mohd
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 165 - 168
  • [4] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [5] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    [J]. SN Computer Science, 2020, 1 (1)
  • [6] An information-sharing based anti-phishing system
    Cheng, Yueqing
    Yuan, Zhen
    Ma, Lei
    Deng, Robert H.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 265 - +
  • [7] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [8] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [9] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [10] NoPhish: An anti-phishing education app
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 88 - 192