SEFAP: An email system fox anti-phishing

被引:2
|
作者
Ren, Qiong [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
anti-phishing; malicious email; digital signature;
D O I
10.1109/ICIS.2007.162
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
More and more users are suffering from entail-based phishing attacks over the past years. Despite the use of various technologies for anti-phishing, phishing is still one of most serious attacks against Internet users. Email phishing attacks fabricate the email's origin. Unfortunately, current email server systems can not authenticate the genuineness of in-coming emails. In this paper, we present a novel antiphishing mechanism: Signed Email for Anti-Phishing (SEFAP), designed to automatically identify an email's origin to mitigate email phishing attacks. The SEFAP system is an extendable secure cryptographic system that accommodates multiple signature schemes. SEFAP can adopt any signature scheme which has two properties: Identity-based and repudiability. Identity-based property removes the unrealistic full PKI infrastructure deployment requirement and the repudiability property protects sender's privacy. We describe how to integrate the SEFAP system into a standard SMTP server. We also proposed an, efficient implementation based on a novel ID-based ring signature scheme.
引用
收藏
页码:782 / +
页数:2
相关论文
共 50 条
  • [11] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [12] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    [J]. 3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185
  • [13] A framework for assessment of anti-phishing preparedness
    Leung, Alvin Chung Man
    Bose, Indranil
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1020 - +
  • [14] Anti-Phishing Awareness Delivery Methods
    Darem, Abdulbasit
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7944 - 7949
  • [15] Analysis and improvement of anti-phishing schemes
    Florencio, Dinei
    Herley, Cormac
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 148 - +
  • [16] Usability evaluation of anti-phishing toolbars
    Linfeng Li
    Marko Helenius
    [J]. Journal in Computer Virology, 2007, 3 (2): : 163 - 184
  • [17] Anti-phishing by smart mobile device
    Han, Weili
    Wang, Yi
    Cao, Ye
    Zhou, Jiping
    Wang, Lixing
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 295 - 300
  • [18] A Design of an Anti-Phishing Training System Collaborated with Multiple Organizations
    Higashino, Masayuki
    [J]. IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2019, : 589 - 592
  • [19] Time Up for Phishing with Effective Anti-Phishing Research Strategies
    Chaudhary, Sunil
    Berki, Eleni
    Li, Linfeng
    Valtanen, Juri
    [J]. INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2015, 6 (02) : 49 - 64
  • [20] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184