SlideShare a Scribd company logo
3
Most read
12
Most read
15
Most read
Using One Time Password How to
Prevent Phishing Attacks
Guided by Presented by
Prof. B.S.Shetty Ritesh Rajesh Sarode
(2012BIT006)
 Introduction
 Phishing
 Anti-Phishing Techniques
 One Time Password
 Mechanism
 Security Analysis
 Conclusion
 References
 Phishing is a malicious activity whereby an
attacker tries get the confidential information of
target.
It is a serious problem because phisher can get
sensitive information like users’ bank account
details, social security numbers, and credit card
numbers.
 To achieve his goal, a phisher first sets up a fake
website that looks almost the same as the
legitimate target website.
 The URL of the fake website is then sent to a
large number of users at random via e-mails or
instant messages.
 Phishing is a form of social engineering carried out
by black hats in electronic form. E.g.e-mail, for
gathering sensitive information.
 Phishing emails may also contain links to websites
that are infected with malware.
 Phishing is typically carried out by email spoofing
and instant messaging.
Using OTP prevent Phishing attacks
List-based
 It maintains a black list or white list, or both.
 Many anti-phishing mechanisms use a black list to
prevent users from accessing phishing sites.
 The effectiveness of black list filtering depends on
the coverage, freshness, and accuracy of the list.
 The URLs are collected by web crawlers, and list
maintainers are responsible for verifying that listed URL
contain phishing site or not.
 Though a well maintained black list can filter most well-
known phishing sites, but it cannot filter unanalyzed
URLs.
 No list can guarantee 100% coverage and up-to-date
freshness.
 Domain name-
A phishing site may register a similar domain
name to that of the target site.
Eg-paypal.com and paypa1.com
 URL-
This allows a phisher to redirect users to a fake
site using a URL
www.paypal.com@123.123.123.123 and
www.paypal.com
 Specific input fields-
Phishing site has some input fields for personal
information, such as passwords, social security
numbers, and credit card numbers.
Using OTP prevent Phishing attacks
 Phisher obtain the touchy data using fake site and then he can
access our Private credentials.
 To prevent password phishing, we use OTP mechanism.
 To overcome this we have preset password method i.e. OTP
 we need a reliable secondary channel to deliver the
password.
 Users can be authenticated with OTP delivered via a secondary
communication channel.
 The user database at the server side matches a user’s login name
with its corresponding identity on another secondary channel.
 When user wants to access a web site then server sends an OTP
to the user through the secondary channel.
 User receives OTP and he can login before OTP expires.
Using OTP prevent Phishing attacks
Phishing attack can only succeed if the attacker knows :
1) The user’s account name.
2) The identity of the secondary channel through which the
user receives the OTP.
3) The password used to access the secondary channel.
 Mutual Authentication.
 Authentication in an untrustworthy environment.
 Man-In-The-Middle attack(MITM).
 lot of methods are there to detecting phishing and securing
users from attacks, but not detect all phishing sites.
 In this paper, we propose a solution that tries to reduce the
number of password phishing attacks by authenticating users
with OTP instead of fixed passwords.
 Thus, any website can take advantage of the proposed solution
by installing instant messaging bots at the server side only.
 www.sciencedirect.com/cybersecurity
 www.globaldigitalforensics.com
 www.seminarsonly.com
 www.wikipedia.com
Using OTP prevent Phishing attacks
Any Questions??

More Related Content

PDF
Trening u5 statki; zabawy oswajające z piłką z akcentem kształtowania orienta...
PDF
DOCUMENTOS FIFA - 8 - EJERCICIOS
DOCX
Matriz, competencias,capacidades y desempeños
PDF
Scouting en el Fútbol Base. Ponencia en Cenafe
PDF
Kształtowanie wytrzymałości specjalnej w ćwiczeniach techniki i małych grach ...
PPTX
Phishing
PDF
Aa4502172179
PPTX
PHISHING attack
Trening u5 statki; zabawy oswajające z piłką z akcentem kształtowania orienta...
DOCUMENTOS FIFA - 8 - EJERCICIOS
Matriz, competencias,capacidades y desempeños
Scouting en el Fútbol Base. Ponencia en Cenafe
Kształtowanie wytrzymałości specjalnej w ćwiczeniach techniki i małych grach ...
Phishing
Aa4502172179
PHISHING attack

Similar to Using OTP prevent Phishing attacks (20)

PDF
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
PDF
A novel way of integrating voice recognition and one time passwords to preven...
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PPSX
Shiv seminar final
PDF
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
PDF
E Mail Phishing Prevention and Detection
PDF
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
PPTX
edu 3 ppt.pptx
PPTX
Chapter-5.pptx
PDF
IJSRED-V2I4P0
PPT
Strategies to handle Phishing attacks
PDF
Bh4101338342
PDF
Phishing Attacks: A Challenge Ahead
PDF
IRJET- Phishing and Anti-Phishing Techniques
PDF
IRJET- Phishing Website Detection based on Machine Learning
PDF
Study on Phishing Attacks and Antiphishing Tools
PDF
Phishing Website Detection Using Machine Learning
PDF
A Review on Antiphishing Framework
PPTX
Phising a Threat to Network Security
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
A novel way of integrating voice recognition and one time passwords to preven...
Welcome to International Journal of Engineering Research and Development (IJERD)
Shiv seminar final
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
E Mail Phishing Prevention and Detection
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
edu 3 ppt.pptx
Chapter-5.pptx
IJSRED-V2I4P0
Strategies to handle Phishing attacks
Bh4101338342
Phishing Attacks: A Challenge Ahead
IRJET- Phishing and Anti-Phishing Techniques
IRJET- Phishing Website Detection based on Machine Learning
Study on Phishing Attacks and Antiphishing Tools
Phishing Website Detection Using Machine Learning
A Review on Antiphishing Framework
Phising a Threat to Network Security
Ad

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Mechanical Engineering MATERIALS Selection
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Sustainable Sites - Green Building Construction
Embodied AI: Ushering in the Next Era of Intelligent Systems
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT on Performance Review to get promotions
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mechanical Engineering MATERIALS Selection
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Digital Logic Computer Design lecture notes
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Ad

Using OTP prevent Phishing attacks

  • 1. Using One Time Password How to Prevent Phishing Attacks Guided by Presented by Prof. B.S.Shetty Ritesh Rajesh Sarode (2012BIT006)
  • 2.  Introduction  Phishing  Anti-Phishing Techniques  One Time Password  Mechanism  Security Analysis  Conclusion  References
  • 3.  Phishing is a malicious activity whereby an attacker tries get the confidential information of target. It is a serious problem because phisher can get sensitive information like users’ bank account details, social security numbers, and credit card numbers.
  • 4.  To achieve his goal, a phisher first sets up a fake website that looks almost the same as the legitimate target website.  The URL of the fake website is then sent to a large number of users at random via e-mails or instant messages.
  • 5.  Phishing is a form of social engineering carried out by black hats in electronic form. E.g.e-mail, for gathering sensitive information.  Phishing emails may also contain links to websites that are infected with malware.  Phishing is typically carried out by email spoofing and instant messaging.
  • 7. List-based  It maintains a black list or white list, or both.  Many anti-phishing mechanisms use a black list to prevent users from accessing phishing sites.  The effectiveness of black list filtering depends on the coverage, freshness, and accuracy of the list.
  • 8.  The URLs are collected by web crawlers, and list maintainers are responsible for verifying that listed URL contain phishing site or not.  Though a well maintained black list can filter most well- known phishing sites, but it cannot filter unanalyzed URLs.  No list can guarantee 100% coverage and up-to-date freshness.
  • 9.  Domain name- A phishing site may register a similar domain name to that of the target site. Eg-paypal.com and paypa1.com  URL- This allows a phisher to redirect users to a fake site using a URL www.paypal.com@123.123.123.123 and www.paypal.com
  • 10.  Specific input fields- Phishing site has some input fields for personal information, such as passwords, social security numbers, and credit card numbers.
  • 12.  Phisher obtain the touchy data using fake site and then he can access our Private credentials.  To prevent password phishing, we use OTP mechanism.  To overcome this we have preset password method i.e. OTP  we need a reliable secondary channel to deliver the password.
  • 13.  Users can be authenticated with OTP delivered via a secondary communication channel.  The user database at the server side matches a user’s login name with its corresponding identity on another secondary channel.  When user wants to access a web site then server sends an OTP to the user through the secondary channel.  User receives OTP and he can login before OTP expires.
  • 15. Phishing attack can only succeed if the attacker knows : 1) The user’s account name. 2) The identity of the secondary channel through which the user receives the OTP. 3) The password used to access the secondary channel.
  • 16.  Mutual Authentication.  Authentication in an untrustworthy environment.  Man-In-The-Middle attack(MITM).
  • 17.  lot of methods are there to detecting phishing and securing users from attacks, but not detect all phishing sites.  In this paper, we propose a solution that tries to reduce the number of password phishing attacks by authenticating users with OTP instead of fixed passwords.  Thus, any website can take advantage of the proposed solution by installing instant messaging bots at the server side only.