IJWMT Vol. 1, No. 6, 15 Dec. 2011
Cover page and Table of Contents: PDF (size: 376KB)
Full Text (PDF, 376KB), PP.38-45
Views: 0 Downloads: 0
Phishing, Authentication, Two-Direction, Two-factor and Iinteraction Authentication, PKI
For phishing problems and its essential characteristics, the authentication protocol of anti-phishing based on two-direction, two-factor, and interaction is proposed, and its safeties are investigated. For PKI security infrastructure and B/S technology model under Internet, an interactive authentication mechanism based on special custom image and client program is designed and implemented. The method is universal to authenticate any server on Internet. It is a new solution of anti-phishing.
Wang Binjun,Wei Yang,Yang Yanyan,Han Jia,"Design and Implementation of Anti-phishing Authentication System", IJWMT, vol.1, no.6, pp.38-45, 2011. DOI: 10.5815/ijwmt.2011.06.06
[1]G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of The Anti-Phishing Working Group.Phishing Activity Trends Report Q2/2008 [OL], http://www.antiphishing.org/resources.html.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
[2]J.Gong Rong, Wang Binjun. “Research on Classification of Phishing Based On Systems Engineering”. Journal of Chinese People’s Public Security University, 2009.4: 91–94.
[3]J.Kong Weiguang. “Technical Analysis of Phishing Attack and Precautionary Measure” Journal of Wuhan University of Science, 2006.3: 63–65M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
[4]C.Zhang Jian, Wang Jishu, Liang Hong. “The Current Situation and Countermeasure of Phishing and Pharming”.The Twentieth National Computer Security Academic Exchanges Conference Collection, 5–8.
[5]Chen Juan, Guo Chuanxiong “Detection Online and Prevention of Phishing Attack.” Journal of PLA University of Science and Technology (Natural Science Edition).
[6]M.Wang Binjun, Jing Qianyuan, Ji Zhengrui. Information Security System. Beijing: Higher Education Press, 2008.
[7]M. Xiao cases. Information security and information warfare.Beijing: Tsinghua University Press, 2004.
[8]M.Qing Sihan. Security Protocol Beijing: Tsinghua University Press, 2005.
[9]C.Wang Binjun, Wei Yang, Gong Rong. “ Design and Implementation of Anti-phishing with Two-direction Authentication System in the B/S Model”.The Proceedings of the Twenty-fifth Computer Security Committee.
[10]J.Guo Zhengrong, Zhou Cheng. “Implementation of Electronic Signature System Based on PKI” Computer Science, 2006.9: 83–88.