Call for Paper - November 2021 Edition
IJCA solicits original research papers for the November 2021 Edition. Last date of manuscript submission is October 20, 2021. Read More

A New Approach to Enhance Internet Banking Security

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan,

M F Mridha, Kamruddin Nur, Aloke Kumar Saha and Md. Akhtaruzzaman Adnan and. A New Approach to Enhance Internet Banking Security. International Journal of Computer Applications 160(8):35-39, February 2017. BibTeX

	author = {M. F. Mridha and Kamruddin Nur and Aloke Kumar Saha and Md. Akhtaruzzaman Adnan and},
	title = {A New Approach to Enhance Internet Banking Security},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {8},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {35-39},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017913093},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


E-Banking in www is growing exponentially, but here consumer authentication, credential confidentiality, transaction information integrity are growing concerns. In this research work emphasize the protection of online banking. At first, E-banking is analyzed for all kinds of vulnerabilities and a practical investigation of all type of attacks is carried out. In this paper, a security-aware architecture is introduced to protect from several attacks. The proposed system has a secure protocol and certificate verification mechanism. The proposed system checks the authenticity of the sender first; then if appropriate, processes the incoming messages and stores them for further processing. This covers everything from phishing site detection to two-factor authentication. Having declared all current schemes for protecting online banking lacking in some way, the key aspects of the problem are identified. This is followed by a proposal for a more robust defense system which uses a small security device to create a trusted path to the customer, rather than depend upon trusting the customer’s computer. This is followed by a description of a demonstration implementation of the system.


  1. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.


E-Banking Security Protocol, E-Banking Authentication