Skip to main content

Protection Mechanisms Against Phishing Attacks

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the client side, it can be implemented with little additional cost by financial institutions or other web retailers and therefore is a good compromise compared to the other approaches. A big drawback is that it doesn’t protect against man-in-the-middle attacks but most of the other approaches don’t either.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. FBI National Press Office: FBI Says Web Spoofing Scams are a Growing Problem, Washington D.C (2003), http://www.fbi.gov/pressrel/pressrel03/spoofing072103.htm

  2. Anti-Phishing Working Group: Proposed Solutions to Address the Threat of Email Spoofing Scams (2003)

    Google Scholar 

  3. Anti-Phishing Working Group: Phishing Activity Trends Report (2005), http://www.antiphishing.org/APWG_Phishing_Activity_Report-January2005.pdf

  4. Litan, A.: Phishing Victims Likely Will Suffer Identity Theft Fraud (2004)

    Google Scholar 

  5. Nassauische Sparkasse: Tipps zur Sicherheit gegen Phishing-Attacken (2004), http://www.naspa.de/05_ebanking/05_6_7_tipps_phishing.php

  6. heise news: Phishing-Tricks werden immer ausgefeilter (2004), http://www.heise.de/newsticker/meldung/52935

  7. Bundesverband deutscher Banken: Online-Banking-Sicherheit. Informationen für Online-Banking-Nutzer, Berlin (2004), http://www.bdb.de/index.asp?channel=901010

  8. Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-side defense against web-based identity theft (2004), http://crypto.stanford.edu/SpoofGuard/webspoof.pdf

  9. Dragoon, A.: Fighting Phish, Fakes and Frauds (2004), http://www.cio.com/archive/090104/phish.html

  10. Böhm, H.: Phishing-Betrüger bevorzugen den Finanzsektor, Wien (2004), http://www.zt-prentner.at/phishing/Pressemitteilung%20Phishing%20Long.pdf

  11. heise news: Anti-Spam-Arbeitsgruppe MARID der IETF streicht die Segel (2004), http://www.heise.de/newsticker/meldung/51379

  12. Financial Times Deutschland: AOL bringt neues Sicherheitskonzept gegen Phishing-Mails (2004), http://www.ftd.de/tm/me/1095597904304.html?nv=wn

  13. KOBIL Systems GmbH: Whitepaper KOBIL SecOVID (2003), http://www.kobil.de/d/support/download/documents/Whitepaper_SecOVID_ver31_20030519.pdf

  14. Schmidt, N.: Tokens statt PIN/TAN: Sicheres Online-Banking ohne Kartenleser (2004), http://www.zdnet.de/itmanager/tech/0,39023442,39125970,00.htm

  15. Oppliger, R.: Sichere streichlisten. digma. Zeitschrift für Datenrecht und Informationssicherheit 1, 34–35 (2005)

    Google Scholar 

  16. Essmayr, W., Leonhardsberger, H., Probst, S., Stockner, W., Weippl, E.: Qualitative evaluation of authentication approaches for ebanking. Technical Report SCCH-TR-0215, Software Competence Center Hagenberg, Hagenberg (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Plössl, K., Federrath, H., Nowey, T. (2005). Protection Mechanisms Against Phishing Attacks. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_3

Download citation

  • DOI: https://doi.org/10.1007/11537878_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics