• Nenhum resultado encontrado

Secure Payment in E-commerce: Deal with Keyloggers and Pishings

N/A
N/A
Protected

Academic year: 2017

Share "Secure Payment in E-commerce: Deal with Keyloggers and Pishings"

Copied!
5
0
0

Texto

(1)

Copyright © 2014 IJECCE, All right reserved

Secure Payment in E-commerce: Deal with Keyloggers

and Pishings

Mehdi Dadkhah

Master Student, Department of Computer and Information Technology, Foolad Institute of Technology,

Foolad shahr, Isfahan 8491663763, Iran Email: mdt@dr.com

Mohammad Davarpanah Jazi

Faculty Member, Department of Computer and Information Technology, Foolad Institute of Technology,

Foolad shahr, Isfahan 8491663763, Iran Email: mdjazi@cc.iut.ac.ir

Abstract–Today, hackers use the Keyloggers and phishing that steal passwords and username from users in online payment. Security Company introduces new application for dealing with this attack but they cannot fight completely. In this paper we will discuss about advanced keylogger and phishing types, and then we describe a preventive anti-phishing technique and an approach to deal with Keyloggers. Our approach, can secure online payment greatly. The anti-phishing technique also is independent from any browser or PC and can extend to other domain such as email service or social network.

KeywordsKeyloggers, Phishing, Virtual Keyboard, Social

Engineering.

I. I

NTRODUCTION

Sometimes attacker creates fake websites that look like the original website. When user enters his information such as email and password on one of the website’s pages, attacker records this information and keeps it. This is called phishing. To do this, an email spoofing or instant messaging is sent to users and it often directs them to enter their personal information details at a fake website. As an example of social engineering techniques, phishing is applied to deceive users for extracting poor usability of current web security technologies [1]. According to a phishing activity trend report published by Anti-phishing working group on June 2013, The number of phishing sites detected fluctuated by nearly 10,000 sites month to month during both Q1 and Q2 (Fig-1), with APWG seeing AN 18 percent increase from April to May, 2013. Aprils 36,480 was the second Lowest number on record, a little higher than the historical low of 35,024 recorded in February 2013[2].

0 10000 20000 30000 40000 50000

April May June

Fig.1. Phishing Activity Trends Report

In general, a phishing attack is made up of four stages (Fig-2).

1. An unreal website which is similar to the real one is designed.

2. The attacking person sends the unreal website link to a large number of users, institutes and companies via email and tries to persuade users to use the website. 3. Victims insert their information into the unreal website. 4. The attacking person steals victims' information and

defrauds them. Fig 2 indicates the process of a given phishing attack.

Fig.2. Phishing attack process

Keyloggers are software that work on background of the operation system then capture any data that user enter with his keyboard. This information will send to hacker, the information that is captured by Keyloggers includes passwords, username or anything that hacker can use it. Some keyloggers allow attacker to periodically send out this information to a pre-defined email or FTP address [3]. There are many types of Keyloggers, but in general they can be categorized in hardware, software, and web keyloggers [4]. Hardware Keylogger is programed chip that save any information when user type with his keyboard [5]. Web keyloggers are invisible pop-up window and collect user information. Also, it is possible to embed malicious code into vulnerable web sites (such as XSS vulnerability) to collect information.

II. T

YPES OF

P

HISHING

A

TTACKS

There are many types of phishing attacks that following are introduced [6].

Deceptive Phishing-

Includes Deceptive Messages such as: your account needs confirmation, you need charge your account, your account need fast change, you get awarded and etc.

Malware-Based Phishing-

In this attack, hacker run the malicious software on the user’s PC. Today attacker use file exploiting security vulnerabilities such as Metasploit [7].

(2)

Hosts File Poisoning-

All operation system such as windows operation have hosts.txt file that placed in ‘C: \windows\system32\drivers\etc\hosts.txt’, by this attack, hacker access to this file then replace some original site with phishing site.

System Reconfiguration Attacks

- By this attack, hacker changes some configuration in victim computer. For example: replace the original address of Gmail in favorites with phishing address.

DNS-Based Phishing -

With a pharming scheme, hackers change a company'shost’sfiles or (DNS) domain name system and redirect users of company to phishing site. For this attack hacker need to hack company server. Fig 3 show hosts file in windows operation systems.

Fig.3. Hosts file in windows.

Content-Injection Phishing-

In this attack, attacker use web vulnerability (such as XSS) and replaces some code in site with harmful code and collect data or redirect user to another site.

Man-in-the-Middle Phishing-

For doing this attack, hackers connect to proxy and use original site (no copy of the original site) then break MFA (multi factor authentication) and collect information. Fig 4 shows Man-in-the-Middle Phishing.

Fig.4. Man-in-the-Middle Phishing

III. R

ELATED

W

ORK ABOUT

K

EYLOGGERS AND

P

HISHINGS

Virtual keyboard was designed to fight with keyloggers in electronic payment pages [9]. Also, security software, carefully Monitor the Startup to block keylogger file from running with loading of operation system. This software was able to verify structures of file and detect keyloggers. Today’s Keyloggers can record keys of virtual keyboard. This keyloggers captured user’s screenshot frequently, and then detect information. Also today’s hackers change structure of the Keyloggers and encapsulated it. As part of the research carried out for this paper, a Comparison done for detection the encapsulated and non-encapsulated keylogger by Security software, the detection rate of encapsulate and non-encapsulate keylogger show in Fig 5 and Fig 6.

(3)

Copyright © 2014 IJECCE, All right reserved

Fig.6. Numberof identified ‘encapsulated’Keyloggers by security software

IV. U

SE OF

S

OCIAL

E

NGINEERING

The art of social engineering is to exploit vulnerabilities in human behavior to create a security breach without the victim's suspicious. Social engineering is misused to deceive people and to persuade them with different methods to get their information.

Instead of using invasive methods and the direct access through the firewall to access the organization's systems and databases, they track people who have access to the information and use social engineering techniques to influence them to gather the information they need. [17] Social engineering through computer systems is done in several ways:

 Pop-Up windows  E-mail Attachments  Deceptive spam and chain  Websites

 Retrieval and Analysis Tools Used  Phishing

Recently Keyloggers maker also use social engineering to achieve their goals.

Since Keylogger should be run on the victim’s operating system, social engineering can be also efficient. Changing executable file’s extension and changing its icon are samples of social engineering to trick the victims.

Since there are different operating systems requiring different executable files, social engineering tool are used to identify the type of victims’ operating system and sometimes to identify the security tools used, which can make the attack more efficient.

Using social engineering tools attackers have not only a way to identify the operating system, but by taking advantage of tools and known exploits, it has also the ability to take advantage of the operating system’s security vulnerabilities (e.g. Windows XP) and then run the Keylogger there.

V. O

UR

T

ECHNIQUES FOR

D

EALING WITH

K

EYLOGGER AND

P

HISHING IN

E-

COMMERCE

P

AYMENT

We describe a preventive technique for detecting phishing attack in online payment and introduce a novel approach for dealing with keylogger. Companies can use our Technique for dealing with keyloggers and phishing in E-commerce. With our Technique hackers cannot steal user’s password and usernames in online payment because phishing pages are detectable and keyloggers cannot captured any data from users.

For dealing with all types of keyloggers, we can use Adobe Flash or Microsoft Silverlight technique; we can design virtual keyboard online payment pages so that animated mouse pointers move on it. Thus when keylogger capture a screenshot from virtual keyboard, it impossible to suggest which key pressed (captured images show in Fig 7) and it will be impossible to guess the password. Thus, even in situations where the computer system is already infected, the keylogger won’t be able to steal passwords and user name. And since all passwords are entered by the virtual keyboard, from which Keyloggers cannot record any data, the captured image by Keylogger will be vague too. Our new approach can deal with different types of advanced Keyloggers.

(4)

Although the pre-mentioned methods for dealing with phishing help us with detecting phishing but they are practically difficult to implement. Many users do not have necessary familiarity with IT knowledge and cannot install and use anti-phishing software. Moreover, these software are suitable for detection of foreign websites and are not applicable to internal banks websites. Further, when a user uses a computer system other than his or her own system, he or she must install necessary software from scratch. Additionally, detection of phishing pages and their storage in database is time-consuming and users are in danger over the process.

For dealing with phishing attack we can use mutual authentication, this method have been developed based on the following three principles:

 Phishing site only can get information from user and cannot answer to any query or request.

 Anything that public for all users, attacker can use it for phishing attack.

 Every credit card (or similar) has basic information such as name, surname, number and etc.

Figure 8 shows our approach, in this method, a user inserts his or her card number first for doing a financial transaction and requests for process. Then, card owner's name and card expiry data are displayed on screen. The user is required to insert second password, CVV2 code and Captcha code for doing a transaction after observing his or her information on the screen. It is natural that if a page is a phishing, the process will not be directed to the next step because a phishing website will not be able to display card owner's name after inserting card number.

Fig.8. Two stage authentication

VI. C

ONCLUSIONS AND

R

ECOMMENDATIONS

In this paper we have briefly introduced 2 techniques for dealing with keylogger and phishing in online payment’s web for secure payment. This approach is independent of computer systems and does not need to be updated with phishing attacks or keyloggers growth. This technique ensures that users see a site that is not a phishing and their password will not stole with keyloggers. This technique can extend to other domain such as email service or social network.

R

EFERENCES

[1] Wikipedia, “Phishing”, March 2014, online document available at: http://en.wikipedia.org/wiki/Phishing

[2] APWG,“Phishing Activity Trends Report 2nd Quarter”,2013, online document available at: http://www.antiphishing.org/ resources/apwg-reports

[3] Christopher A. Wood and Rajendra K. Raj,”Keyloggers in Cyber security Education”, New York, USA, 2010, page 293-295. [4] Mehdi Dadkhah, Mohammad Davarpanah Jazi, ” A Novel

approach to deal with Keyloggers”, Oriental Journal of Computer Science & Technology, Vol. 7, No. (1), 2014, pages 25-28.

[5] Wikipedia,” Hardware keylogger”, online Document available at: http://en.wikipedia.org/wiki/Hardware_keylogger, 2014. [6] Gaurav, Madhuresh Mishra, Anurag Jain, “Anti-Phishing

Techniques: A Review”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2,Mar-Apr 2012, pp.350-355.

[7] Metasploit project. [Online]. Available: http://www.metasploit. com

[8] Afolayan A, Obiniyi and Mohammed Aminu Umar,”Random Number Based Dynamic Anti-Screenshot Virtual Keyboard for Securer Web Login”, the International Journal of Engineering and Science, 2013, page 19-25.

[9] McAfee Inc.” McAfee Virus Scan Enterprise 8.8 Best Practices Guide”, 2010, page 1-10.

[10] Michael Atighetchi, Partha Pal, “Attribute-based prevention of phishing attacks” Eighth IEEE international symposium on network computing and application, 2009, pages 266-269. [11] V.Shreeram, M.Suban, P.Shanthi, K.Manjula, “Anti-phishing

detection of phishing attacks using genetic algorithm”, Communication control and computing technology (ICCCCT), IEEE international conference, Ramanathapuram, 2010, pages 447-450.

[12] Madhuresh Mishra, Gaurav, Anurag Jain, “A Preventive Anti-Phishing Technique using Code word”, International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012, 4248–4250.

[13] Juan Chen, Chuanxiong Guo, “Online Detection and Prevention of Phishing Attacks (Invited Paper)”in proceedings of Communicational and networking in china, first international conference, Beizing, 2007, pages 1-7.

[14] Matthew Dunlop, Stephen Groat, and David Shelly, ” GoldPhish: Using Images for Content-Based Phishing Analysis”, in proceedings of internet monitoring and protection(ICIMP), fifth international conference, Barcelona, 2010, Pages 123-128. [15] Naveen Agarwal, Scott Renfro, Arturo Bejar, “Yahoo!’s Sign-in

Seal and current anti-phishing solutions”, Yahoo! Inc, 2007, page 3-4.

[16] Hicham Tout, William Hafner, “Phishing: An identity-based anti-phishing approach”, International Conference on Computational Science and Engineering, Vancouver, BC, 2009, pages 347-352.

(5)

Copyright © 2014 IJECCE, All right reserved

A

UTHOR

S

P

ROFILE

Mehdi Dadkhah

He is a master student (Computer and Information Technology) of Foolad Institute of Technology and researcher that work on information security. He has detected many web vulnerabilities in famous content management system and work on XOOPS open application system project as a web security researcher.

Dr .Mohammad Davarpanah Jazi

He got his PhD in information system from UMIST, UK. He has been a faculty member at Isfahan University of technology and Foolad Institute of Technology, Iran.

i

Imagem

Fig 3 show hosts file in windows operation systems.
Figure  8  shows  our  approach,  in  this  method,  a  user inserts  his  or  her  card  number  first  for  doing  a  financial transaction  and  requests  for  process

Referências

Documentos relacionados

a cada caso concreto, conceituar o que seriam “fatos sabidamente inverídicos” e, em seguida, enquadrar ou não os conteúdos impugnados no âmbito dessa expressão. Por outro

de terapia intensiva neonatal, distribuídos em três grupos: Grupo Estudo 1, formado por 42 neonatos com Síndrome de Arnold Chiari tipo II; Grupo Estudo 2, constituído por 38

Newborns and infants with Arnold-Chiari Type II Malformation and Myelomeningocele presented higher occurrence of cochlear hearing loss, auditory neuropathy spectrum, and

Having these data, we collected objective and subjective information regard- ing the signs and symptoms of the nursing diagnosis Impaired Comfort, presented by the children

Os fatores apontados à colaboração disto pelos participantes foram o tempo prolongado de permanência na SRPA, a verbalização de desconforto térmico e o tremor

Com o principal objetivo de se recolher e analisar um sólido conjunto de leituras, para colmatar a ausência de um estudo prático detalhado, relativo ao funcionamento do detetor

Katzmair (2018), que mapeou iniciativas, projetos, grupos, pessoas e insti- tuições em 92 países com relação direta a essas práticas, identificou ainda algumas semelhanças