BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks f...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-03-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/24/5/1676 |
_version_ | 1797263821789724672 |
---|---|
author | Anastasios Papathanasiou George Liontos Georgios Paparis Vasiliki Liagkou Euripides Glavas |
author_facet | Anastasios Papathanasiou George Liontos Georgios Paparis Vasiliki Liagkou Euripides Glavas |
author_sort | Anastasios Papathanasiou |
collection | DOAJ |
description | In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication. |
first_indexed | 2024-04-25T00:19:06Z |
format | Article |
id | doaj.art-8671793516624da98b315ba15496de2e |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-25T00:19:06Z |
publishDate | 2024-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-8671793516624da98b315ba15496de2e2024-03-12T16:55:36ZengMDPI AGSensors1424-82202024-03-01245167610.3390/s24051676BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) AttacksAnastasios Papathanasiou0George Liontos1Georgios Paparis2Vasiliki Liagkou3Euripides Glavas4Cyber Crime Division, Hellenic Police, 173 Alexandras Avenue, 11522 Athens, GreeceDepartment of Materials Science and Engineering, University of Ioannina, 45110 Ioannina, GreeceIndependent Researcher, 10678 Athens, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, Kostaki Artas, 47150 Arta, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, Kostaki Artas, 47150 Arta, GreeceIn an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication.https://www.mdpi.com/1424-8220/24/5/1676business email compromise (BEC)email securityQR code encryptioncryptographydigital communication securitymessage authentication code |
spellingShingle | Anastasios Papathanasiou George Liontos Georgios Paparis Vasiliki Liagkou Euripides Glavas BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks Sensors business email compromise (BEC) email security QR code encryption cryptography digital communication security message authentication code |
title | BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks |
title_full | BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks |
title_fullStr | BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks |
title_full_unstemmed | BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks |
title_short | BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks |
title_sort | bec defender qr code based methodology for prevention of business email compromise bec attacks |
topic | business email compromise (BEC) email security QR code encryption cryptography digital communication security message authentication code |
url | https://www.mdpi.com/1424-8220/24/5/1676 |
work_keys_str_mv | AT anastasiospapathanasiou becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks AT georgeliontos becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks AT georgiospaparis becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks AT vasilikiliagkou becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks AT euripidesglavas becdefenderqrcodebasedmethodologyforpreventionofbusinessemailcompromisebecattacks |