Averting man in the browser attack using user-specific personal images

作者: P. Goyal , N. Bansal , N. Gupta

DOI: 10.1109/IADCC.2013.6514413

关键词: Computer scienceInternet privacyMulti-factor authenticationMan-in-the-middle attackTrojanAuthenticationNoticeDatabase transactionInternet accessComputer security

摘要: In the recent years, there has been a tremendous rise in online banking transactions. Some of major factors contributing to this growth are - easy availability higher bandwidth internet connections at low cost and ease transactions compared traditional methods. Also, field attracted cybercriminals take advantage loopholes process transaction. One most advanced threats today is Man The Browser (MitB) attack. MitB attack deploys Trojan browser user then steals credentials initiate transaction for transferring money mule account. All happens without any notice bank or user. defeats two factor authentication currently used by banks authenticate identity performing This paper presents new framework enhancing during an tackle problem

参考文章(6)
Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz, Breaking e-banking CAPTCHAs annual computer security applications conference. pp. 171- 180 ,(2010) , 10.1145/1920261.1920288
Keechul Jung, Kwang In Kim, Anil K. Jain, Text information extraction in images and video: a survey Pattern Recognition. ,vol. 37, pp. 977- 997 ,(2004) , 10.1016/J.PATCOG.2003.10.012
Timothy Dougan, Kevin Curran, Man in the Browser Attacks International Journal of Ambient Computing and Intelligence. ,vol. 4, pp. 29- 39 ,(2012) , 10.4018/JACI.2012010103
Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems IEEE Transactions on Parallel and Distributed Systems. ,vol. 22, pp. 1390- 1397 ,(2011) , 10.1109/TPDS.2010.206
Laerte Peotta, Marcelo D. Holtz, Bernardo M. David, Flavio G. Deus, Rafael Timoteo de Sousa, A FORMAL CLASSIFICATION OF INTERNET BANKING ATTACKS AND VULNERABILITIES International Journal of Computer Science and Information Technology. ,vol. 3, pp. 186- 197 ,(2011) , 10.5121/IJCSIT.2011.3113