CFP last date
22 April 2024
Reseach Article

A New Approach to Enhance Internet Banking Security

by M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan and
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 8
Year of Publication: 2017
Authors: M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan and
10.5120/ijca2017913093

M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan and . A New Approach to Enhance Internet Banking Security. International Journal of Computer Applications. 160, 8 ( Feb 2017), 35-39. DOI=10.5120/ijca2017913093

@article{ 10.5120/ijca2017913093,
author = { M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan and },
title = { A New Approach to Enhance Internet Banking Security },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 8 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number8/27097-2017913093/ },
doi = { 10.5120/ijca2017913093 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:11.517869+05:30
%A M. F. Mridha
%A Kamruddin Nur
%A Aloke Kumar Saha
%A Md. Akhtaruzzaman Adnan and
%T A New Approach to Enhance Internet Banking Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 8
%P 35-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-Banking in www is growing exponentially, but here consumer authentication, credential confidentiality, transaction information integrity are growing concerns. In this research work emphasize the protection of online banking. At first, E-banking is analyzed for all kinds of vulnerabilities and a practical investigation of all type of attacks is carried out. In this paper, a security-aware architecture is introduced to protect from several attacks. The proposed system has a secure protocol and certificate verification mechanism. The proposed system checks the authenticity of the sender first; then if appropriate, processes the incoming messages and stores them for further processing. This covers everything from phishing site detection to two-factor authentication. Having declared all current schemes for protecting online banking lacking in some way, the key aspects of the problem are identified. This is followed by a proposal for a more robust defense system which uses a small security device to create a trusted path to the customer, rather than depend upon trusting the customer’s computer. This is followed by a description of a demonstration implementation of the system.

References
  1. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.
Index Terms

Computer Science
Information Sciences

Keywords

E-Banking Security Protocol E-Banking Authentication