4.2 Article

Circumventing security toolbars and phishing filters via rogue wireless access points

期刊

WIRELESS COMMUNICATIONS & MOBILE COMPUTING
卷 10, 期 8, 页码 1128-1139

出版社

WILEY-HINDAWI
DOI: 10.1002/wcm.829

关键词

DNS poisoning, evil twin, pharming; phishing, security toolbars

向作者/读者索取更多资源

One of the solutions that has been widely used by naive users to protect against phishing attacks is security toolbars or phishing filters in web browsers. The present study proposes a new attack to bypass security toolbars and phishing filters via local DNS poisoning without the need of an infection vector. A rogue wireless access point (AP) is set up, poisoned DNS cache entries are used to forge the results provided to security toolbars. and thus misleading information is displayed to the victim. Although there are several studies that demonstrate DNS poisoning attacks, none to our best knowledge investigate whether such attacks can circumvent security toolbars or phishing filters. Five well-known security toolbars and three reputable browser built-in phishing filters are scrutinized, and none of them detect the attack. So ineptly, security toolbars provide the victim with false confirmative indicators that the phishing site is legitimate. Copyright (C) 2009 John Wiley & Sons, Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据