In this work, a quick authentication scheme is implemented to prevent Phishing and DNS spoofing. In DNS spoofing, attackers inject the fake DNS server by duplicating the IP addresses and fake server redirect network traffic to wrong destinations. In phishing, phishers clone the legitimate website and user think that it is original website and users giving away their username and passwords to attacker’s website and attackers hack their confidential information and they can misuse it for financial gain, identity theft, gaining fame, malware distribution and industrial espionage. We host the phishing website but we cannot pass the link through common hosting websites like Google and Facebook. So, phishers force the legitimate users to open a phished link with the DNS spoofing through fake DNS server then user directly redirect to a fake server. So our proposed work is to prevent DNS spoofing, to prevent the Phishing attacks by isolating it using 64-bit time synchronized public key encryption.
[1]
J. Doug Tygar,et al.
The battle against phishing: Dynamic Security Skins
,
2005,
SOUPS '05.
[2]
Ramana Rao Kompella,et al.
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
,
2010,
2010 Proceedings IEEE INFOCOM.
[3]
T. Chomsiri.
Sniffing Packets on LAN without ARP Spoofing
,
2008,
2008 Third International Conference on Convergence and Hybrid Information Technology.
[4]
Markus Jakobsson,et al.
Distributed Phishing Attacks
,
2005,
IACR Cryptol. ePrint Arch..