104 research outputs found
A Secure Mobile-based Authentication System
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetric
cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.
Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own
trusted computers.La informació financera és extremadament sensible. Per tant, la banca electrònica ha de proporcionar un sistema robust per autenticar als seus clients i fer-los accedir a les dades de forma remota. D'altra banda, aquest sistema ha de ser usable, accessible, i portàtil. Es proposa una resposta al desafiament basat en una contrasenya única (OTP), esquema que utilitza la criptografia simètrica en combinació amb un mòdul de maquinari de seguretat. Amés, aquesta solució ofereix mobilitat convenient per als usuaris que volen bancària en línia en qualsevol moment i en qualsevol lloc, no només des dels seus propis equips de confiança.La información financiera es extremadamente sensible. Por lo tanto, la banca electrónica debe proporcionar un sistema robusto para autenticar a sus clientes y hacerles acceder a sus datos de forma remota. Por otra parte, dicho sistema debe ser usable, accesible, y portátil. Se propone una respuesta al desafío basado en una contraseña única (OTP), esquema que utiliza la criptografía simétrica en combinación con un módulo hardware de seguridad hardware. Además, esta solución ofrece una movilidad conveniente para los usuarios que quieren la entidad bancaria en línea en cualquier momento y en cualquier lugar, no sólo des de sus propios equipos de confianza
Costs and benefits of authentication advice
When it comes to passwords, conflicting advice can be found everywhere.
Different sources give different types of advice related to authentication. In
this paper such advice is studied. First, using a sample collection of
authentication advice, we observe that different organizations' advice is often
contradictory and at odds with current research. We highlight the difficulties
organizations and users have when determining which advice is worth following.
Consequently, we develop a model for identifying costs of advice. Our model
incorporates factors that affect organizations and users, including, for
example, usability aspects. Similarly, we model the security benefits brought
by such advice. We then apply these models to our taxonomy of advice to
indicate the potential effectiveness of the security recommendations. We find
that organizations experience fewer costs than users as a result of
authentication policies. Reassuringly, the advice our model has classified as
good or bad, is in line with the NIST 2017 digital authentication guidelines
An Analysis of Text-Based Authentication using Images in Banking System
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking organizations evolves and spreads with the introduction of enhanced communication technologies. Though, this novel business occasion for the provision of banking products and services increases the need for security, especially due to the sensitive nature of the information exchanged. The specific nature of Internet banking systems creates the necessity for focused facts on security issues to be able to successfully demeanor an assessment or security evaluation process. More specifically, the information systems (IS) auditor should have the necessary technical and operational skills and knowledge to carry out the review of the technology employed and risks associated with Internet banking. Following this requirement, this paper presents a novel authentication approach to provide security to the end users. This proposed system, Analysis of Text-Based Authentication using Images in Banking System (ATBAIBS) provides great value in terms of convenience, customer intimacy, time saving, inexpensiveness and coherence in banking sectors
Recommended from our members
Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of Believes, Particularly by Modified BAN Logic.
The importance of the data authentication has resulted in the science of the data protection. Interest in this knowledge has been growing due to the increase in privacy of the user's identity, especially after the widespread use of online transactions. Many security techniques are available to maintain the privacy of the user's identity. These include password, smart card or token and face recognition or finger print. But unfortunately, the possibility to duplicate the identity of a user is still possible. Recently, specialists used the user's physical location as a new factor in order to increase the strength of the verification of the user's identity.
This thesis focused on the authentication-based user's location. It is based on the idea of using the Global Position System in order to verify the user identity. Improving Kerberos protocol using GPS signal is proposed in order to eliminate the effect of replay attack. This proposal does not expect a high performance from the user during the implementation of the security system. Moreover, to give users more confidence to use security protocol, it has to be evaluated before accepting it. Thus, a measurement tool used to validate protocols called BAN logic was described. In this thesis, a new form of BAN logic which aims to raise the efficiency checking process of the protocol protection strength using the GPS signal is proposed.
The proposed form of Kerberos protocol has been analysed using the new form of BAN logic. The new scheme has been tested and compared with the existing techniques to demonstrate its merits and capabilities
Improving Authentication for Users via Better Understanding Password Use and Abuse
Passwords are our primary form of authentication. Yet passwords are a major
vulnerability for computer systems due to their predictable nature, in fact Florêncio
et al., conclude that human limitations makes what is often considered to be
“proper password use” impossible [52]. It is vital we improve authentication with
respect to both security and usability. The aim of this research is to investigate
password use and abuse in order to improve authentication for users.
We investigate circulated password advice that claims to help in this security fight.
We find that it is contradictory, often at odds with best practice and research
findings, and can be ambiguous and taxing on users. We complete a user study
investigating user and administrator perceptions of the password advice collected.
We leverage knowledge of security benefits, usability and organisation costs to
investigate the trade-offs that exist when security advice is enforced.
To improve password systems, effective and accurate information is needed regarding
the prevalence of security vulnerabilities. We develop a guessability metric
which produces guessing success results that are independent of the underlying distribution
of the data. We use this to prove that small password breaches can lead
to major vulnerabilities to entire cohorts of other users. We also demonstrate that
a tailored learning algorithm can actively learn characteristics of the passwords
it is guessing, and that it can leverage this information to improve its guessing.
We demonstrate that characteristics such as nationality can be derived from data
and used to improve guessing, this reduces security in an online environment and
potentially leaks private information about cohorts of users.
Finally, we design models to quantify the effectiveness of security policies. We
demonstrate the value of the NIST 2017 guidelines. We find that if an organisation
is willing to bear costs on themselves, they can significantly improve usability for
their end-users, and simultaneously increase their security
Secure entity authentication
According to Wikipedia, authentication is the act of confirming the truth of an attribute of a single piece of a datum claimed true by an entity. Specifically, entity authentication is the process by which an agent in a distributed system gains confidence in the identity of a communicating partner (Bellare et al.). Legacy password authentication is still the most popular one, however, it suffers from many limitations, such as hacking through social engineering techniques, dictionary attack or database leak. To address the security concerns in legacy password-based authentication, many new authentication factors are introduced, such as PINs (Personal Identification Numbers) delivered through out-of-band channels, human biometrics and hardware tokens. However, each of these authentication factors has its own inherent weaknesses and security limitations. For example, phishing is still effective even when using out-of-band-channels to deliver PINs (Personal Identification Numbers). In this dissertation, three types of secure entity authentication schemes are developed to alleviate the weaknesses and limitations of existing authentication mechanisms: (1) End user authentication scheme based on Network Round-Trip Time (NRTT) to complement location based authentication mechanisms; (2) Apache Hadoop authentication mechanism based on Trusted Platform Module (TPM) technology; and (3) Web server authentication mechanism for phishing detection with a new detection factor NRTT. In the first work, a new authentication factor based on NRTT is presented. Two research challenges (i.e., the secure measurement of NRTT and the network instabilities) are addressed to show that NRTT can be used to uniquely and securely identify login locations and hence can support location-based web authentication mechanisms. The experiments and analysis show that NRTT has superior usability, deploy-ability, security, and performance properties compared to the state-of-the-art web authentication factors. In the second work, departing from the Kerb eros-centric approach, an authentication framework for Hadoop that utilizes Trusted Platform Module (TPM) technology is proposed. It is proven that pushing the security down to the hardware level in conjunction with software techniques provides better protection over software only solutions. The proposed approach provides significant security guarantees against insider threats, which manipulate the execution environment without the consent of legitimate clients. Extensive experiments are conducted to validate the performance and the security properties of the proposed approach. Moreover, the correctness and the security guarantees are formally proved via Burrows-Abadi-Needham (BAN) logic. In the third work, together with a phishing victim identification algorithm, NRTT is used as a new phishing detection feature to improve the detection accuracy of existing phishing detection approaches. The state-of-art phishing detection methods fall into two categories: heuristics and blacklist. The experiments show that the combination of NRTT with existing heuristics can improve the overall detection accuracy while maintaining a low false positive rate. In the future, to develop a more robust and efficient phishing detection scheme, it is paramount for phishing detection approaches to carefully select the features that strike the right balance between detection accuracy and robustness in the face of potential manipulations. In addition, leveraging Deep Learning (DL) algorithms to improve the performance of phishing detection schemes could be a viable alternative to traditional machine learning algorithms (e.g., SVM, LR), especially when handling complex and large scale datasets
Near field communication based-model for authentication in online banking
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Computer-Based Information Systems (MSIS) at Strathmore UniversityOnline banking has enabled bank customers to perform their banking activities at the comfort of their homes as opposed to physically visiting the bank branches. In the banking environment, authentication is very crucial because the bank should be able to give access to the only authorized customers. Currently, there are various authentication methods available to the banks for authenticating their customers. However, the empirical study has shown that there is an increasing number of identity theft leading to huge financial loses for both banks and bank customers. Additionally, the better authentication systems are complex for customers and more costly to the banks. This dissertation discusses the use of Near Field Communication (NFC), a short range based wireless communication technology currently improving the consumers’ usability due to its ability to exchange digital material as well as connecting electronic devices remotely. It is an evolving technology employing the use of Radio frequency identification (RFID) that lets electronic devices like Smart phones interconnect over very close range. The NFC technology has been integrated into some available Smart phones, when employed together with other authentication mechanisms such as Master Card’s Chip authentication program (CAP), its usability level is increased. The model employs the use of NFC enabled Smart phones and NFC enabled bank cards as third factor authentication. Agile methodology was used for the model development, and a java code that generates a QR code was developed. The NFC based model, when implemented is able to eliminate the need for a hard token which is an extra baggage to the customer and additional cost to the bank. Consequently, the NFC technology enhances security for online banking by protecting against online identity theft as well as form basis for future research in NFC application the banking industry
Tutorial and Critical Analysis of Phishing Websites Methods
The Internet has become an essential component of our everyday social and financial activities. Internet is not important for individual users only but also for organizations, because organizations that offer online trading can achieve a competitive edge by serving worldwide clients. Internet facilitates reaching customers all over the globe without any market place restrictions and with effective use of e-commerce. As a result, the number of customers who rely on the Internet to perform procurements is increasing dramatically. Hundreds of millions of dollars are transferred through the Internet every day. This amount of money was tempting the fraudsters to carry out their fraudulent operations. Hence, Internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customers’ confidence in e-commerce and online banking. Therefore, suitability of the Internet for commercial transactions becomes doubtful. Phishing is considered a form of web threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain user’s confidential credentials such as usernames, passwords and social security numbers. In this article, the phishing phenomena will be discussed in detail. In addition, we present a survey of the state of the art research on such attack. Moreover, we aim to recognize the up-to-date developments in phishing and its precautionary measures and provide a comprehensive study and evaluation of these researches to realize the gap that is still predominating in this area. This research will mostly focus on the web based phishing detection methods rather than email based detection methods
- …