...
首页> 外文期刊>Wireless communications & mobile computing >Circumventing security toolbars and phishing filters via rogue wireless access points
【24h】

Circumventing security toolbars and phishing filters via rogue wireless access points

机译:通过恶意无线访问点规避安全工具栏和网络钓鱼过滤器

获取原文
获取原文并翻译 | 示例

摘要

One of the solutions that has been widely used by naive users to protect against phishing attacks is security toolbars or phishing filters in web browsers. The present study proposes a new attack to bypass security toolbars and phishing filters via local DNS poisoning without the need of an infection vector. A rogue wireless access point (AP) is set up, poisoned DNS cache entries are used to forge the results provided to security toolbars, and thus misleading information is displayed to the victim. Although there are several studies that demonstrate DNS poisoning attacks, none to our best knowledge investigate whether such attacks can circumvent security toolbars or phishing filters. Five well-known security toolbars and three reputable browser built-in phishing filters are scrutinized, and none of them detect the attack. So ineptly, security toolbars provide the victim with false confirmative indicators that the phishing site is legitimate.
机译:天真的用户已广泛使用以防止网络钓鱼攻击的解决方案之一是安全工具栏或Web浏览器中的网络钓鱼过滤器。本研究提出了一种新的攻击方式,可以通过本地DNS中毒绕过安全工具栏和网络钓鱼过滤器,而无需感染媒介。设置了恶意无线访问点(AP),使用中毒的DNS缓存条目伪造提供给安全工具栏的结果,因此向受害者显示误导性信息。尽管有几项研究证明了DNS中毒攻击,但据我们所知,没有一类调查此类攻击是否可以规避安全工具栏或网络钓鱼过滤器。仔细检查了五个著名的安全工具栏和三个知名的浏览器内置网络钓鱼过滤器,但没有一个能检测到攻击。因此,安全工具栏无能为力地为受害者提供了虚假的确认指标,表明钓鱼网站是合法的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号