BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks f...

Full description

Bibliographic Details
Main Authors: Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
Format: Article
Language:English
Published: MDPI AG 2024-03-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/24/5/1676
_version_ 1797263821789724672
author Anastasios Papathanasiou
George Liontos
Georgios Paparis
Vasiliki Liagkou
Euripides Glavas
author_facet Anastasios Papathanasiou
George Liontos
Georgios Paparis
Vasiliki Liagkou
Euripides Glavas
author_sort Anastasios Papathanasiou
collection DOAJ
description In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication.
first_indexed 2024-04-25T00:19:06Z
format Article
id doaj.art-8671793516624da98b315ba15496de2e
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-25T00:19:06Z
publishDate 2024-03-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-8671793516624da98b315ba15496de2e2024-03-12T16:55:36ZengMDPI AGSensors1424-82202024-03-01245167610.3390/s24051676BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) AttacksAnastasios Papathanasiou0George Liontos1Georgios Paparis2Vasiliki Liagkou3Euripides Glavas4Cyber Crime Division, Hellenic Police, 173 Alexandras Avenue, 11522 Athens, GreeceDepartment of Materials Science and Engineering, University of Ioannina, 45110 Ioannina, GreeceIndependent Researcher, 10678 Athens, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, Kostaki Artas, 47150 Arta, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, Kostaki Artas, 47150 Arta, GreeceIn an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication.https://www.mdpi.com/1424-8220/24/5/1676business email compromise (BEC)email securityQR code encryptioncryptographydigital communication securitymessage authentication code
spellingShingle Anastasios Papathanasiou
George Liontos
Georgios Paparis
Vasiliki Liagkou
Euripides Glavas
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
Sensors
business email compromise (BEC)
email security
QR code encryption
cryptography
digital communication security
message authentication code
title BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
title_full BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
title_fullStr BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
title_full_unstemmed BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
title_short BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
title_sort bec defender qr code based methodology for prevention of business email compromise bec attacks
topic business email compromise (BEC)
email security
QR code encryption
cryptography
digital communication security
message authentication code
url https://www.mdpi.com/1424-8220/24/5/1676
work_keys_str_mv AT anastasiospapathanasiou becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks
AT georgeliontos becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks
AT georgiospaparis becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks
AT vasilikiliagkou becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks
AT euripidesglavas becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks