International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 160 - Issue 8 |
Published: Feb 2017 |
Authors: M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan And |
![]() |
M. F. Mridha, Kamruddin Nur, Aloke Kumar Saha, Md. Akhtaruzzaman Adnan And . A New Approach to Enhance Internet Banking Security. International Journal of Computer Applications. 160, 8 (Feb 2017), 35-39. DOI=10.5120/ijca2017913093
@article{ 10.5120/ijca2017913093, author = { M. F. Mridha,Kamruddin Nur,Aloke Kumar Saha,Md. Akhtaruzzaman Adnan And }, title = { A New Approach to Enhance Internet Banking Security }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 160 }, number = { 8 }, pages = { 35-39 }, doi = { 10.5120/ijca2017913093 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A M. F. Mridha %A Kamruddin Nur %A Aloke Kumar Saha %A Md. Akhtaruzzaman Adnan And %T A New Approach to Enhance Internet Banking Security%T %J International Journal of Computer Applications %V 160 %N 8 %P 35-39 %R 10.5120/ijca2017913093 %I Foundation of Computer Science (FCS), NY, USA
E-Banking in www is growing exponentially, but here consumer authentication, credential confidentiality, transaction information integrity are growing concerns. In this research work emphasize the protection of online banking. At first, E-banking is analyzed for all kinds of vulnerabilities and a practical investigation of all type of attacks is carried out. In this paper, a security-aware architecture is introduced to protect from several attacks. The proposed system has a secure protocol and certificate verification mechanism. The proposed system checks the authenticity of the sender first; then if appropriate, processes the incoming messages and stores them for further processing. This covers everything from phishing site detection to two-factor authentication. Having declared all current schemes for protecting online banking lacking in some way, the key aspects of the problem are identified. This is followed by a proposal for a more robust defense system which uses a small security device to create a trusted path to the customer, rather than depend upon trusting the customer’s computer. This is followed by a description of a demonstration implementation of the system.