Font Size: a A A

Research On Phishing's Acitve Defense Systerm Based On Website's Logo

Posted on:2015-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:L X LiuFull Text:PDF
GTID:2428330491952515Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Recently,with the rapid development of Internet,network almost covers our livesand works sweepingly.Although it brings convenience for us,it also makes criminals become more and more rampant by using it.Phishing attacks refer to that criminals get private information by cheating users and then use those information to obtain money of users by tricking Internet users to log in the spoofed bank and e-business websites,which damages uses' interest seriously and makes users lose credit to Internet enterprises.Concerning about Internet service providers,this thesis proposes a method of identity statements based on websites' features and a method of identity marking based on website Logo.Then designs a model of website identity authentication by using websites' features and websites' Logo,and implements a phishing active defense system by combing clients and server.The main contributions are summarized as follows.1.A method of identity statements based on websites' features is proposed.Firstly,select the websites' features to express the identity,then carry out hash algorithm for the selected features collection to obtain website identity information C.The identity information is robust to normal modifications of websites,but it is sensitive to phishing attacks.2.A method of identity marking based on websites' Logo is presented.Firstly,convert website identity information C into an image of two-dimension code,then embed the image into website Logo by using a color image blind watermarking algorithm based on QR decomposition,and then upload the Logo on the website,which makes the website have the ability to prove its identity.3.Phishing active defense system based on website Logo is designed and implemented.The system core is a model of website identity authentication,and meanwhile combines black and white list detection technology with active defense system model based on the URL anomaly detection technology.The system includes the subsystem of website server identity marking,the identity detection subsystem of client-side and the server-side and the shared subsystems of processing results.Through the contrast experiment and the simulation attacks,the identity statements method has robustness against normal website update and has sensitivity to phishing attacks.The experimental results of the identity marking method has proved that the method has fast processing speed and good invisibility.
Keywords/Search Tags:Phishing, Anti-Phishing, Identification, Logo, Active Defense
PDF Full Text Request
Related items