Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/1979
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHanees, A.L.-
dc.contributor.authorShafana, M.S.-
dc.date.accessioned2016-12-22T04:13:55Z-
dc.date.available2016-12-22T04:13:55Z-
dc.date.issued2016-12-20-
dc.identifier.citation6th International Symposium 2016 on “Multidisciplinary Research for Sustainable Development in the Information Era,” pp 414-422.en_US
dc.identifier.isbn978-955-627-098-3-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/1979-
dc.description.abstractIn recent times, phishing is a wide spread technique to steal user’s authentication information, especially password. The key issue is that it is difficult for user to differentiate fake Login User Interface from normal login. This paper presents a unique method to predict phishing by smart device. In our technique, a smart device pre-stores feature information of Login User Interface. Before entering authentication information, a plug-in of Web browser at host side will verify the validation of Login Inter face according to pre-stored Login Interface information. Wi-Fi provides a communication channel between the plug-in and the smart device. Furthermore, the smart device can automatically fill the field of user id and password to the Login User Interface if Login User Interface passes the verification of smart mobile device. Compared with other solutions, this solution cans greatly improve the security of authentication.en_US
dc.language.isoen_USen_US
dc.publisherSouth Eastern University of Sri Lankaen_US
dc.subjectPhishingen_US
dc.subjectAuthenticationen_US
dc.subjectLogin user interaceen_US
dc.titlePhishing attack prediction by smart mobile devicesen_US
dc.typeArticleen_US
Appears in Collections:6th International Symposium - 2016

Files in This Item:
File Description SizeFormat 
PHISHING ATTACK PREDICTION BY SMART MOBILE DEVICES.pdf532.41 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.