CAPTCHA security for Phishing: Secure or not?

ABSTRACT

Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning.
CAPTCHA is primarily used to anti bot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank’s customer.

Assuming users are always unconscious of security warning in our model, we have designed a series of attacks and defenses under this interesting condition. We will start by formalizing a security defense utilizing CAPCTCHA, its limitations are analyzed; Then, we will attack a local bank employing CAPTCHA solution, which we show how its can be bypassed from its vulnerability in its implementation. We further introduce – Control-Relaying Man-In-The-Middle (CR-MITM) attack, a remote attack just like a Remote Terminal Service that can capture and relay user inputs without local Trojan assistant, which is possible to defeat CAPTCHA phishing protection in the future. Under our model, we conclude, visual security defense alone is feeble for anti-phishing.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Honeypots

ABSTRACT

Honeypot is an exciting new technology with enormous potential for the security community. It is resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques.
They are a highly flexible tool that comes in many shapes and sizes. This paper deals with understanding what a honeypot actually is ,and how it works.
There are different varieties of honeypots. Based on their category they have different applications. This paper gives an insight into the use of honeypots in productive as well as educative environments.
This paper also discusses the advantages and disadvantages of honeypots , and what the future hold in store for them.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Model checking for Securing E-commerce transaction

ABSTRACT

The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt that must be satisfied by e-commerce protocols. This seminar shows how model checking can be used to obtain an assurance about the existence of these properties in an e-commerce protocol. It is essential that these desirable properties be satisfied, even in the presence of site or communication failure. Using the model checker we evaluate which failures cause the violation of one or more of the properties. The results of the analysis are then used to propose a mechanism that handles the failures to make the protocol failure resilient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Grid Network

ABSTRACT


Grid is as an emerging technology for enabling resource sharing and coordinated problem solving in dynamic multi-institutional virtual organizations. In the grid environment, resources may belong to different institutions, have different usage policies and pose different requirements on acceptable requests.

one of the fundamental operations needed to support location independent computing is resource discovery .It is the process of locating relevant resources based on application requirements of a user.

The description of a resource is essential for automated resource discovery and search, selection, matching, composition and interoperation, invocation and execution monitoring; different middle-ware specifies different rules for describing a resource. Hence, the information gathered from these diverse sources tends to be semantically heterogeneous and needs to be correlated.

Efficient resource discovery needs uniform unambiguous resource description. To date there is no universal resource description language common to all state of art grid middleware. Different grid middleware systems have different methods of resource description and it is not yet known how well these can interoperate. Hence, there is a need to utilize semantic matching of these resource descriptions.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.



Mail ID: - contact4seminars@gmail.com



* conditions apply


– OR –


Click here for Quick Contact (Request for Topics)



  • © 2008 – 2013 seminars4you,

  • All rights reserved.