0% found this document useful (0 votes)
4 views

All-in-One Identity Protection and Phishing Defence System

SecureBrowse is an extension of Google Chrome designed to address the growing threats of cybersecurity such as phishing, weak passwords and identity theft. Combine three key features: Phishing detection for real time alerts on malicious websites, password administrator for safe credential storage and identity protection to safeguard the confidential user data.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

All-in-One Identity Protection and Phishing Defence System

SecureBrowse is an extension of Google Chrome designed to address the growing threats of cybersecurity such as phishing, weak passwords and identity theft. Combine three key features: Phishing detection for real time alerts on malicious websites, password administrator for safe credential storage and identity protection to safeguard the confidential user data.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671

All-in-One Identity Protection and Phishing


Defence System
Aryan Khandelwal1; Sarvesh M Rao2; Kaavya B3; Dr. U. Surendar4
1;2;3
B. Tech 4th Year; 4Assistant Professor,
1
Department of CSE, SRMIST, Chennai, India
2
Department of CSE, SRMIST, Chennai, India
3
Department of CSE, SRMIST, Chennai, India
4
Department of CSE, SRMIST, Chennai, India

Publication Date: 2025/04/26

Abstract: SecureBrowse is an extension of Google Chrome designed to address the growing threats of cybersecurity such as
phishing, weak passwords and identity theft. Combine three key features: Phishing detection for real time alerts on malicious
websites, password administrator for safe credential storage and identity protection to safeguard the confidential user data.
With an emphasis on accessibility and ease of use, Securebrowse is perfectly integrated into daily navigation while
guaranteeing robust security through advanced encryption and cybersecurity practices. This project empowers users to
navigate the digital world safely and confidently.

Keywords: Secure Browse, Phishing Detection, Identity Protection.

How to Cite: Aryan Khandelwal; Sarvesh M Rao; Kaavya B; Dr. U. Surendar (2025). All-in-One Identity Protection and Phishing
Defence System. International Journal of Innovative Science and Research Technology, 10(4), 1462-1467.
https://doi.org/10.38124/ijisrt/25apr671

I. INTRODUCTION can be victims of fraudulent attempts. Simultaneously, the


Password Administrator stores safe and unique passwords
In the current interconnected digital world, cyber threats for each account, automatically generates strong credentials
such as phishing attacks, identity theft and poor password and eliminates the need to remember multiple session,
management continue to evolve, raising significant risks for significantly reducing the risk of reuse of credentials and
people, companies and organizations equally. As the most brute force attacks.
confidential data is shared and stored online, the need for a
unified and robust cyber security solution has never been In addition, the identity protection component
more critical. To address these growing concerns, we propose continuously monitors the dark website and data violations
a identity and defence protection system of Phishing, a due to compromised personal information signs, allowing
comprehensive and easy -to -use platform designed to rapid action when suspicious activity is detected. Users
strengthen digital security from multiple angles. receive alerts and recommendations to mitigate any potential
damage, preserving their online reputation and financial
This innovative solution perfectly integrates phishing welfare.
advanced, Safe password management and Identity
protection in a single application, offering users a centralized Either for people looking for tranquillity in their
centre to administer and safeguard their digital identities. navigation or daily organizations that strive to comply with
Taking advantage of Avant -grade technologies such as end cybersecurity regulations and protect their interested parties,
-to -end encryption, Automatic learning algorithms and this system that covers everything offers a scalable, reliable
Multifactor authentication (MFA), the system actively and proactive defence against the growing landscape of cyber
detects and neutralizes threats in real time while guaranteeing threats.
that credentials and personal data of users remain private and
safe. Ultimately, our solution allows users to tools and
knowledge they need to navigate the digital world safely,
The phishing detection module uses automatic learning with confidence and safe.
to analyse emails, websites and other communication
channels for suspicious patterns, alerting users before they

IJISRT25APR671 www.ijisrt.com 1462


Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671
II. LITERATURE SURVEY computing', in the International Journal of Advanced
Pervasive and Ubiquitous Computing (IJAPUC). The
 Luther Martin's paper, "Identity-based Encryption: From paper would most probably give an in-depth review of the
Identity and Access Management to Enterprise Privacy access control mechanisms employed by attribute-based
Management," describes how IBE could simplify key encryption in cloud computing environments. The paper
management based on user identities instead of PKIs. may describe various ABE schemes with their application
Implicit key authentication and built-in recovery of keys in controlling access to cloud resources with attributes. It
from the system also make enhanced security and privacy is more likely to focus on the notion of assessing the
possible. In addition to these, HIBE is a variant of IBE, success and suitability of the application of ABE-based
which allows delegating the generation of keys across access control over security in cloud environments.
organizational levels. However, the key escrow problem
remains an open issue because the PKG may decrypt all  Kapil et al. (2020) have presented an attribute-based score
messages. encryption (HE) algorithm to secure big data in the
Hadoop distributed file system (HDFS). This algorithm
 Ishaq Azhar Mohammed's paper on 'Intelligent combines ABE with key encryption to protect the data and
Authentication for Identity and Access Management' is thwart brutal force attacks. Instead of merely encrypting
interesting. As this discusses the IAM benefits in an the data, it also generates "scores" that are deceptive but
enterprise, especially keeping the authentication issue as attractive appearing. A few of the issues identified are
the core, it points out the challenges of effective password handling the complexities of an amalgamation of ABE
management and IT redundancy-impacting productivity, and HE, performance with large amounts hosted in HDFS,
security, and efficiency. This solution introduces an and efficient key distribution and management. The
intelligent approach to IAM, consolidating user identities current paper addresses the problem that big data systems
into one identity with unified roles and rules, easing such as Hadoop, besides the large scale of data, have to
administration but at the same time enhancing security. It deal with and lead to the necessity of balancing between
tries to probe into how methods like multifactor security and computing overhead.
authentication can help streamline processes.
 Heading, Katsikeas, and Lagerström conducted an
 This paper by Ishaq Azhar Mohammed 'Identity and extensive literature review in 2023 of related research
Access Management as Security-as-a-Service from communities in the context of cybersecurity vulnerability
Clouds,' discusses IAM solutions offered as a SECaaS assessment. They map the landscape of research
from cloud platforms. The paper examines how IAM from activities, identify key topics, methodologies, and
the cloud benefits from high-security advantages. The collaboration networks within that field and outline a wide
paper likely covers the benefits, challenges, and variety of approaches used to assess vulnerability, from
associated implementation aspects of the IAM service technical analysis of policy and management
delivered over the cloud. perspectives. The issues noted here involve issues
concerning fragmentation of research activities, which
 Abikoye et al. (2019) offer a paper, 'Modified Advanced may affect comprehensive strides toward overall
Encryption Standard Algorithm for Information Security' understanding as well as the accelerating rate of threats,
published in Symmetry. The paper is likely a means which are indeed outpacing the assessment
through which improvements are offered to the AES methodologies used. Other concerns in this regard include
algorithm to enhance information security. The paper not standardizing methodologies across the distinct
would probably discuss the type of modifications done to domains or disciplines and a stronger need for more
the AES to solve particular security issues or performance extensive interdisciplinary involvement to adequately
enhancement. It is probably working on the approach of tackle involved cybersecurity issues.
offering a more robust type of encryption algorithm for
secure data transmission and storage.  Varsha and Suryateja (2014) also discussed the utility of
using attribute-based encryption along with Advanced
 A Survey of Access Control and Data Encryption for Encryption Standard to enable and promote wide-scale
Database Security' is a paper written by Khalaf and Kadi, sharing of PHR in a cloud environment. Their approach is
and published in the Journal of King Abdulaziz based on ABE for access according to attributes of the
University. This paper would have given mechanisms for users, so that the encrypted data can be maintained within
access controls and data encryption techniques that the reach of an attacker, along with the AES-based secure
enhance security in a database. It may include many mechanism for encryption of the actual data. This double
models of access and ways of data encryption in the layer of encryption approach aims at improving the
databases. Probably the focus is on surveying existing security and accessibility in managing PHR. Their work
approaches and their effectiveness in ensuring database highlighted some of the issues concerning core and
security. distribution management, scalability when growing with
the users and attributes, as well as the trade-off towards
 Bhajantri and Mujawar published their paper, 'A security and system performance. It also involved
comprehensive review of access control mechanism legitimate access that was to protect health information in
based on attribute-based encryption scheme for cloud a dynamic cloud environment.

IJISRT25APR671 www.ijisrt.com 1463


Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671
 A new cryptographic approach to the access control of managerial conduct and outcomes, improving each the
encrypted data has been introduced, as presented in perceptions of fulfilment and actual mission results. The
Goyal, Pandey, Sahai, and Waters's "Characteristic study emphasises the significance of obvious and
Encryption for Access Control of Encrypted Data" in available facts structures in powerful project control.
2006. The authors introduce the concept of Attribute-
Based Encryption (ABE), through which access policies  Jarvenpaa and Ives (1994) look at the concept of the
can be defined based on user attributes rather than global network agency, focusing on the possibilities and
identities. It allows fine access control wherein data will challenges presented by records management in an
be accessed only by users with a given set of credentials. increasingly interconnected international network. They
An efficient scheme of ABE construction is presented, argue that rising technologies and global networks allow
and its practical application in different scenarios that businesses to function extra flexibly and effectively
require flexible and reliable data sharing is demonstrated. across geographic boundaries. However, this shift
The proposed scheme improves the ability to handle and additionally brings challenges, together with handling
protect sensitive data in a decentralized environment. various statistics structures, ensuring data consistency,
and overcoming cultural and organizational variations.
 In the paper by Bethencourt, Sahai, and Waters in 2007, The authors emphasize the want for powerful statistics
there is a new type of Attribute-Based Encryption called management techniques to harness the capacity of world
Ciphertext-Policy ABE abbreviated as CP-ABE. In this networks whilst addressing the complexities of
process, a ciphertext access policy is defined for the coordination, verbal exchange, and managing in a
encryption process. This is made such that it allows the decentralized organizational shape.
data owner to make a decision on which one has the
privilege of decrypting the data according to its attributes.  Mohammed, Hassan, and Yusuf Mohammed (2018) talk
This technique allows flexibility and security in managing about the improvement and implementation of an
access without relying on underlying cryptographic internet-based totally Identity and Access Management
primitives, making it quite suitable for application (IAM) system for corporations. The paper highlights the
scenarios requiring access control with sharing data and crucial position of IAM in making sure stable access to
protecting them. The authors give a constructive complete organizational sources by using coping with user
implementation of CP-ABE to illustrate the efficiency and identities and controlling get entry to rights. The authors
effectiveness that such a structure brings about in terms of advise a web-based totally answer that complements
sensitive information access within distributed systems safety and simplifies the method of managing person
and also discuss how the scheme offers resistance against authentication, authorization, and role-based totally get
fusion attacks, thereby making this structure tougher in admission to across numerous corporation structures.
practical application. Their technique specializes in scalability, ease of use, and
flexibility to deal with the developing complexity of
 The paper proposed by Attrapadung and Imai entitled corporation environments whilst maintaining high
"Dual-policy attribute-based encryption" is a paper that standards of security and person control.
proposes an extended notion in Attribute-Based
Encryption (ABE), where key-policy ABE and III. IMPLEMENTATION
ciphertext-policy ABE are merged into the same
framework. Dual-policy ABE consequently enables  Download & Install
policies that have been defined within a user's keys to be The user downloads and installs the Chrome extension
compatible with policies existing in the ciphertext, thus from the official store.
creating a higher expressiveness level in any access
control framework. The presented construction and  Log in
security analysis by the authors in their scheme will User log in using their credentials to access the features.
demonstrate the applicability of their scheme in handling
more complex access control scenarios. Thus, this  Enable Features
approach will extend the applicability of ABEs within The user selects and enables one or more of the
diverse environments where increasingly sophisticated following features:
fine-grained access management is required.
 Identity Protection
 Take a look at by using Bendoly and Swink (2007)  Password Manager
explores the impact of information entry on mission  Phishing Protection
control conduct, performance, and perceptions. It
highlights how getting right of entry to applicable and  Identity Protection (If Enabled)
timely facts can have an effect on selection-making,
venture execution, and the overall efficiency of control  Scans for tracking cookies and removing them.
practices. The authors found that accelerated records get  Blocks ads to enhance privacy.
right of entry to enhance challenge overall performance  Applies additional security measures to prevent data
by facilitating higher coordination and verbal exchange. leaks.
Moreover, it moderates the connection between

IJISRT25APR671 www.ijisrt.com 1464


Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671
 Password Manager (If Enabled)  It prevents users from entering sensitive information on
malicious sites.
 Auto-fill login credentials on saved websites.  Provides alerts and warnings against online threats.
 Securely stores and encrypts user passwords.
 Provides quick and seamless access to accounts.  Continuous Protection

 Phishing Protection (If Enabled)  The extension runs in the background, ensuring ongoing
security.
 Detects and blocks phishing websites in real time.  Updates automatically to protect against new threats.

IV. RESULT

Fig 1 Secure Browse Extension Popup Home Page showing all the available Options.

Fig 2 A Page with an AD Placement when the Identity Protection Feature is Disabled

Fig 3 A Page with AD Placement when the Identity Protection Feature is Enabled.

IJISRT25APR671 www.ijisrt.com 1465


Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671

Fig 4 Site Getting Blocked by the Extension when Visiting a Malicious Site to Prevent Phishing Threats

V. DISCUSSION  Implements role-based access control (RBAC) to


restrict unauthorized access.
To effectively address cybersecurity threats, the All-in-  Supports biometric authentication (optional) for an
One Identity Protection and Phishing Defense System is added layer of security.
structured into the following key modules:
 Security Monitoring & Reporting Module
 Phishing Detection Module
 Tracks and logs security events, including phishing
 Identifies and blocks phishing websites using machine attempts and login activities.
learning and real-time threat intelligence from  Generates detailed reports on user activity and security
databases like PhishTank. threats.
 Analyzes website URLs and content to detect suspicious  Provides real-time notifications for detected security
behavior. breaches.
 Provides alerts and warnings to users about potential
phishing threats.  Admin Dashboard & User Interface Module

 Password Manager Module  A user-friendly dashboard for managing stored


passwords, security settings, and phishing reports.
 Securely stores and manages user credentials using  Allows users to customize security preferences.
encryption algorithms like AES-256.  Provides a visual representation of detected threats and
 Generates strong passwords and auto-fills login security status.
credentials to prevent weak password usage.
 Implements multi-device synchronization for seamless VI. CONCLUSION
access.
The All-in-One Identity Protection and Phishing
 Identity Protection Module Defense System is a comprehensive cybersecurity solution
that addresses the growing threats of phishing attacks, weak
 Enhances security using Two-Factor password management, and identity theft. By integrating
 Authentication (2FA) via SMS or authenticator apps. phishing detection, secure password storage, and identity
 Detects unauthorized login attempts and notifies users of protection, this system enhances online security and provides
suspicious activity. users with a safer digital experience. The implementation of
 Implements OAuth-based secure authentication for machine learning, encryption, and multi-factor authentication
third-party login protection. ensures robust protection against evolving cyber threats. This
project not only helps individuals and organizations
 User Authentication & Authorization Module safeguard their sensitive data but also promotes better
security practices by encouraging the use of strong passwords
 Uses JWT (JSON Web Tokens) for secure user sessions. and real-time phishing detection. By providing a user-

IJISRT25APR671 www.ijisrt.com 1466


Volume 10, Issue 4, April – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25apr671
friendly and efficient security solution, this system [12]. Attrapadung, N., & Imai, H. (2009). Dual-policy
contributes to the larger goal of cyber threat mitigation and a attribute-based encryption. In *Applied Cryptography
more secure digital environment .With its scalable and and Network Security: 7th International Conference,
adaptable design, the proposed system can be further ACNS 2009, Paris-Rocquencourt, France, June 2-5,
enhanced with additional security features, making it a 2009.
valuable tool for protecting users against emerging cyber [13]. Bendoly, E. and Swink, M., 2007. Moderating effects
risks in the ever-evolving digital landscape. of information access on project management
behavior, performance and perceptions. Journal of
REFERENCES Operations Management, 25(3), pp.604-622.
[14]. Jarvenpaa, S.L. and Ives, B., 1994. The global network
[1]. Martin, L. (2007). Identity-based Encryption: From organization of the future: Information management
Identity and Access Management to Enterprise opportunities and challenges. Journal of management
Privacy Management. Information Systems Security, information systems, 10(4), pp.25-57.
16(1). [15]. Mohammed, K.H., Hassan, A. and Yusuf Mohammed,
[2]. Mohammed, I. A. (2017). Systematic review of D., 2018. Identity and access management system: a
identity access management in information security. web-based approach for an enterprise.
International Journal of Innovations in Engineering
Research and Technology, 4(7), 1-7.
[3]. Azhar, I. (2017). Identity and Access Management as
Security as a Service from Clouds. International
Journal of Creative Research Thoughts (IJCRT), ISSN
2320-2882.
[4]. Abikoye, O. C., Haruna, A. D., Abubakar, A., Akande,
N. O., & Asani, E. O. (2019). Modified advanced
encryption standard algorithm for information
security. Symmetry, 11(12), 1484.
[5]. Khalaf, E. F., & Kadi, M. M. (2017). A survey of
access control and data encryption for database
security. Journal of King Abdulaziz University, 28(1),
19-30.
[6]. Bhajantri, L. B., & Mujawar, T. N. (2019). A
comprehensive review of access control mechanism
based on attribute based encryption scheme for cloud
computing. International Journal of Advanced
Pervasive and Ubiquitous Computing (IJAPUC),
11(3), 33-52
[7]. Kapil, G., Agrawal, A., Attaallah, A., Algarni, A.,
Kumar, R., & Khan, R. A. (2020). Attribute-based
honey encryption algorithm for securing big data: A
Hadoop distributed file system perspective. PeerJ
Computer Science, 6, e259.
[8]. Heiding, F., Katsikeas, S., & Lagerström, R. (2023).
Research communities in cyber security vulnerability
assessments: A comprehensive literature review.
Computer Science Review, 48, 100551.
[9]. Varsha, B. S., & Suryateja, P. S. (2014). Using
attribute-based encryption with advanced encryption
standard for secure and scalable sharing of personal
health records in the cloud. *International Journal of
Computer Science and Information Technologies*,
5(5), 6395-6399. Proceedings 7* (pp. 168-185).
Springer Berlin Heidelberg
[10]. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006,
October). Attribute-based encryption for fine-grained
access control of encrypted data. In *Proceedings of
the 13th ACM Conference on Computer and
Communications Security* (pp. 89-98).
[11]. Bethencourt, J., Sahai, A., & Waters, B. (2007, May).
Ciphertext-policy attribute-based encryption. In
*2007 IEEE Symposium on Security and Privacy
(SP'07)* (pp. 321-334). IEEE.

IJISRT25APR671 www.ijisrt.com 1467

You might also like