BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

Author:

Papathanasiou Anastasios12,Liontos George3ORCID,Paparis Georgios4,Liagkou Vasiliki2ORCID,Glavas Euripides2ORCID

Affiliation:

1. Cyber Crime Division, Hellenic Police, 173 Alexandras Avenue, 11522 Athens, Greece

2. Department of Informatics and Telecommunications, University of Ioannina, Kostaki Artas, 47150 Arta, Greece

3. Department of Materials Science and Engineering, University of Ioannina, 45110 Ioannina, Greece

4. Independent Researcher, 10678 Athens, Greece

Abstract

In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication.

Funder

mmersive Virtual, Augmented and Mixed Reality Center of Epirus

Competitiveness, Entrepreneurship and Innovation

European Regional Development Fund

Publisher

MDPI AG

Reference57 articles.

1. (2023, November 01). Oberlo. Available online: https://www.oberlo.com/statistics/how-many-emails-are-sent-per-day.

2. The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends;Nespoli;IEEE Access,2020

3. Business email compromise (BEC) attacks;Humayun;Mater. Today Proc.,2021

4. Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud;Cross;J. Financ. Crime,2020

5. FBI (2023, April 25). Internet Crime Report, Available online: https://www.ic3.gov/Media/PDF/AnnualReport/2022IC3Report.pdf.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3