4 research outputs found
Outflanking and securely using the PIN/TAN-System
The PIN/TAN-system is an authentication and authorization scheme used in
e-business. Like other similar schemes it is successfully attacked by
criminals. After shortly classifying the various kinds of attacks we accomplish
malicious code attacks on real World Wide Web transaction systems. In doing so
we find that it is really easy to outflank these systems. This is even
supported by the users' behavior. We give a few simple behavior rules to
improve this situation. But their impact is limited. Also the providers support
the attacks by having implementation flaws in their installations. Finally we
show that the PIN/TAN-system is not suitable for usage in highly secure
applications.Comment: 7 pages; 2 figures; IEEE style; final versio
Strong Authentication for Web Services using Smartcards
The popularity of the Internet and the variety of services it provides has been immense. Unfortunately, many of these services require the user to register and subsequently login to the system in order to access them. This has resulted in the user having to remember a multitude of username and password combinations in order to use the service securely. However, literature has clearly demonstrated this is not an effective approach, as users will frequently choose simple passwords, write them down, share them or use the same password for multiple systems. This paper proposes a novel concept where Internet users authenticate to web services (service providers) by the use of a smartcard – taking away any requirement for the user to provide credentials. The smartcard is useful in this context as it is a trusted device that is capable of applying cryptography in a tamper resistant environment. The development of the concept is based upon an extension to Authentication Authorisation Infrastructure (AAI) models, where a trusted authority (Identity Provider) will provide and manage the smart card to end-users. In devices such as mobile phones, a smartcard is already present (e.g. the SIM) to facilitate this and it is envisaged such a card could also be produced for desktop environments – similarly to what many banks are currently implementing
An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman
Authentication mechanisms provide the cornerstone for security for many distributed systems, especially for increasingly popular online applications. For decades, widely used, traditional authentication methods included passwords and PINs that are now inadequate to protect online users and organizations from ever more sophisticated attacks. This study proposes an improvement to traditional authentication mechanisms. The solution introduced here includes a one-time-password (OTP) and incorporates the concept of multiple levels and multiple channels – features that are much more successful than traditional authentication mechanisms in protecting users' online accounts from being compromised.
This research study reviews and evaluates current authentication classes and mechanisms and proposes an authentication mechanism that uses a variety of techniques, including multiple channels, to resist attacks more effectively than most commonly used mechanisms. Three aspects of the mechanism were evaluated:
1. The security of multi-channel authentication (MCA) was evaluated in theoretical terms, using a widely accepted methodology.
2. The usability was evaluated by carrying out a user study.
3. Finally, the acceptability thereof was evaluated by asking the participants in study (2) specific questions which aligned with the technology acceptance model (TAM). The study’s analysis of the data, gathered from online questionnaires and application log tables, showed that most participants found the MCA mechanism superior to other available authentication mechanisms and clearly supported the proposed MCA mechanism and the benefits that it provides.
The research presents guidelines on how to implement the proposed mechanism, provides a detailed analysis of its effectiveness in protecting users' online accounts against specific, commonly deployed attacks, and reports on its usability and acceptability. It represents a significant step forward in the evolution of authentication mechanisms meeting the security needs of online users while maintaining usability
Recommended from our members
An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing
Hacking information systems is continuously on the increase. Social engineering
attacks is performed by manipulating the weakest link in the security chain; people.
Consequently, this type of attack has gained a higher rate of success than a technical
attack.
Based in Expert Systems, this study proposes a proactive and integrated
Intelligent Social Engineering Security Model to mitigate the human risk and reduce the
impact of social engineering attacks.
Many computer users do not have enough security knowledge to be able to
select a strong password for their authentication. The author has attempted to implement
a novel quantitative approach to achieve strong passwords. A new fuzzy logic tool is
being developed to evaluate password strength and measures the password strength
based on dictionary attack, time crack and shoulder surfing attack (social engineering).
A comparative study of existing tools used by major companies such as Microsoft,
Google, CertainKey, Yahoo and Facebook are used to validate the proposed model and
tool.
A comprehensive literature survey and analytical study performed on phishing
emails representing social engineering attacks that are directly related to financial fraud
are presented and compared with other security threats. This research proposes a novel
approach that successfully addresses social engineering attacks. Another intelligent tool
is developed to discover phishing messages and provide educational feedback to the user focusing on the visible part of the incoming emails, considering the email’s source
code and providing an in-line awareness security feedback