Sensors (Mar 2024)

BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

  • Anastasios Papathanasiou,
  • George Liontos,
  • Georgios Paparis,
  • Vasiliki Liagkou,
  • Euripides Glavas

DOI
https://doi.org/10.3390/s24051676
Journal volume & issue
Vol. 24, no. 5
p. 1676

Abstract

Read online

In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication.

Keywords