SlideShare a Scribd company logo
1 of 28
Download to read offline
Detection and prevention of
security vulnerabilities associated
with mobile banking applications
 Team: TRAC

 Members: Tessy Sebastian
        Rafael Santana
        Alisa Pinchuk
        Clinton D Souza
Agenda
•   Objective
•   Background
•   Related Work
•   Our Approach
•   Results
•   Conclusion
•   Contribution
•   Questions
Objective

•   Purpose: analyze the security aspects of mobile
    banking applications

•   Analyzed current exploitation techniques

•   Analyzed types of intrusion detection techniques

•   Proposed unique and efficient methodology for
    authentication in mobile banking application
Background

•   “Electronic banking – the execution of financial
    services via the Internet – changed the business of
    retail banks significantly, at the same time reducing
    costs and increasing convenience for the customer”
    (Pousttchi & Schurig, 2004).

•   Enhance access, user-friendliness and availability

•   Concern over the authenticity and integrity of data
Common Mobile Application Attacks


•   Information Disclosure

•   Logical attacks

•   Phishing

•   Sniffing
Information Disclosure

•   Information leakage, loss and distort

•   Use of wireless data network

•   Tools that protect the wireless transmit
    media
Logical attacks

•   Abuse of functionality, denial of service,
    insufficient anti-automation, insufficient
    process validation

•   DDoS attack
    o   slow down the response of the system
    o   users unable to enter normal mobile banking system
Phishing
•   masquerading
    trustworthy entity

•   email

•   Vishing

•   Smishing
Sniffing
•   Passive sniffing
    o   get information from communication medium


•   Active sniffing
    o inject packets into the traffic


•   Wi-fi Sniffing
    o   sending data thats not encrypted


•   Use sniffer software
Related Work : Intrusion Detection
•   Stephen and Wilson in their research paper
    proposed a detection technique based on
    global and local observations of user’s
    behavior

•   Karlsen and Killingberg designed and
    implemented an intrusion detection
    technique for internet banking systems
    based on profiles
Intrusion Detection
•   Detect or identify an attempt to gain
    unauthorized access

•   Intrusion detection systems (IDS)

•   Two intrusion detection techniques
    o Anomaly Detection
    o Misuse Detection
Current Intrusion Detection
Techniques
•   User profile based intrusion detection
    technique
    o   User's behavior to detect anomalies
    o   User statistics, usage pattern, transaction amount


•   Drawbacks
    o   Need considerable amount of data
    o   Natural changes in usage pattern
Our Approach
Detection
    Profile Based Intrusion Detection

•   Composed of 5 models to form a session
    structure profile:
    o Usage patterns
    o Inter-request time delay
    o Session time
    o User statistics
    o Response
Detection
Data source: Transaction Log
   o   Transactions performed by the user


The session structure profile:
   o Will attempt to flag an unusual sequence of
     attempts
   o Classified unusual as an anomaly
   o Evaluate the interaction between the user and the
     application


Analyzed by: Markov Chain
Prevention
Two Factor Authentication
An approach which required the presentation
  of two or more of three factors.

1. Knowledge factor : defines something the user knows.

2. Possession factor : defines something the user has.

3. Inherence factor : defines something the user is.
Phases of Authentication
Registration Phase
Login/Handshake Phase
Transmission Phase
•   Details how user information is transmitted over the
    internet.
•   User has no control over medium of transmission.
•   All banking institutions use SSL/TLS encryption using
    SSL handshaking protocol.
•   Establishes a secure connection.
•   Certain research papers propose use of steganography
    as medium of transmission.
•   Existence of data is hidden within a data or audio file
    and transmitted to the banking server.
Verification Phase
Data Transfer
•   Data transactions can be transferred over the channel
    using secure WTLS protocols.

•   WTLS uses modern cryptographic algorithms, in
    common with TLS, allows negotiations of cryptographic
    suites between client and server.

•   The data transfer section handles actions and queries
    by users such as checking new balance, adding more
    money , depositing a cheque etc..
Mutual Authentication
•   Two efficient ways, that the authentication
    notification can be made effective was through email
    and SMS.

•   Based on previous sections on intrusion detection we
    believe this adds to its enhancement as it serves as
    means of detection in-case of unauthorized access.
Results : Prevention
PROS
•  The use of speech approach as a mean of
   authentication currently has an error rate of less than
   1% which has reduced from 33% in 2003.

• A research paper published in 2010 by Shen, Zheng and
  Li provided statistical and modular data proving the
  effectiveness of voice recognition using GMM-UBM
  voice recognition approach.
CONS
• More work needs to be done on separating background
  noises from user speech.
Results : Detection
PROS
• Session structure profile provides a total picture of the
  user’s behavior

•   Lead to the detection of a more general behavior
    rather than just simple individual values.

CONS
• The approach shows promising results but based on
  previous research some activities may pass as
  fraudulent.
Conclusion
•   We discussed various types of attacks that occur on
    mobile devices, and attacks that occur specifically on
    the mobile banking.

•   We additionally discussed the current intrusion
    detection systems.

•   Finally, we proposed an authentication mechanism.
Contributions
•   Alisa Pinchuk :
     o    Selected relevant attacks on mobile banking applications , and provided a foundation which
          proved the solutions proposed will help reduce the occurrence of the attack.


•   Clinton D Souza:
     o    Designed Two Factor authentication using PIN and Voice recognition based on recent studies
          and current authentication system implementation.


•   Rafael Santana:
     o    Found very unique intrusion detections systems that are being proposed in the research
          community and which if implemented will assist banking systems in better protecting their
          servers and application which are deployed.


•   Tessy Sebastian:
     o    Found very unique intrusion detections systems that are being proposed in the research
          community and which if implemented will assist banking systems in better protecting their
          servers and application which are deployed.
References
1. Nie, J., & Hu, X. (2008). Mobile banking information security and protection methods. Retrieved from
     <http://ieeexplore.ieee.org.ezproxy1.lib.asu.edu/stamp/stamp.jsp?tp=&arnumber=4722412&tag=1>.


(Nie & Hu, 2008)


2. Ruggiero , P., & Foote , J. (n.d.). Cyber threats to mobile phones. Retrieved from <http://www.us-
     cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf>.


(Ruggiero & Foote)


3. Shen, L., Zheng, N., Zheng, S., & Li, W. (n.d.). Secure mobile services by face and speech based personal authentication.


(Shen, Zheng, Zheng & Li)


4. Sanderson, C.; Bengio, S.; Bourlard, H.; Mariethoz, J.; Collobert, R.; BenZeghiba, M.F.; Cardinaux, F.; Marcel, S.; , "Speech &
     face based biometric authentication at IDIAP," Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International
     Conference on , vol.3, no., pp. III- 1-4 vol.3, 6-9 July 2003


5. Yang Wujian; Wu Yangkai; Chen Guanlin; , "Application of Voice Recognition for Mobile E-Commerce Security," Circuits,
     Communications and System (PACCS), 2011 Third Pacific-Asia Conference on , vol., no., pp.1-4, 17-18 July 2011
doi: 10.1109/PACCS.2011.5990286
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5990286&isnumber=5990080
Questions




            ?

More Related Content

What's hot

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsIOSR Journals
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...AngelinaJacobs2
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Chinese taipei 1366688667
Chinese taipei  1366688667Chinese taipei  1366688667
Chinese taipei 1366688667Nurul Yakin
 
Presentation Undergraduate Project
Presentation Undergraduate ProjectPresentation Undergraduate Project
Presentation Undergraduate ProjectCevdet Basaran
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...cscpconf
 

What's hot (20)

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Chinese taipei 1366688667
Chinese taipei  1366688667Chinese taipei  1366688667
Chinese taipei 1366688667
 
Presentation Undergraduate Project
Presentation Undergraduate ProjectPresentation Undergraduate Project
Presentation Undergraduate Project
 
dos attacks
dos attacksdos attacks
dos attacks
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
 

Viewers also liked

Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingClinton DSouza
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
МТС лайф - корпоративная социальная сеть
МТС лайф - корпоративная социальная сетьМТС лайф - корпоративная социальная сеть
МТС лайф - корпоративная социальная сетьDaOffice
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsInfo-Tech Research Group
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)Olga Lavrentieva
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITBob Rhubart
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (19)

Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computing
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
МТС лайф - корпоративная социальная сеть
МТС лайф - корпоративная социальная сетьМТС лайф - корпоративная социальная сеть
МТС лайф - корпоративная социальная сеть
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Detection and Prevention of security vulnerabilities associated with mobile banking applications

Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarDr. Shivashankar
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST @ University of Adelaide
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networksVidhya Moorthy
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 

Similar to Detection and Prevention of security vulnerabilities associated with mobile banking applications (20)

Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
J1802035460
J1802035460J1802035460
J1802035460
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networks
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 

Detection and Prevention of security vulnerabilities associated with mobile banking applications

  • 1. Detection and prevention of security vulnerabilities associated with mobile banking applications Team: TRAC Members: Tessy Sebastian Rafael Santana Alisa Pinchuk Clinton D Souza
  • 2. Agenda • Objective • Background • Related Work • Our Approach • Results • Conclusion • Contribution • Questions
  • 3. Objective • Purpose: analyze the security aspects of mobile banking applications • Analyzed current exploitation techniques • Analyzed types of intrusion detection techniques • Proposed unique and efficient methodology for authentication in mobile banking application
  • 4. Background • “Electronic banking – the execution of financial services via the Internet – changed the business of retail banks significantly, at the same time reducing costs and increasing convenience for the customer” (Pousttchi & Schurig, 2004). • Enhance access, user-friendliness and availability • Concern over the authenticity and integrity of data
  • 5. Common Mobile Application Attacks • Information Disclosure • Logical attacks • Phishing • Sniffing
  • 6. Information Disclosure • Information leakage, loss and distort • Use of wireless data network • Tools that protect the wireless transmit media
  • 7. Logical attacks • Abuse of functionality, denial of service, insufficient anti-automation, insufficient process validation • DDoS attack o slow down the response of the system o users unable to enter normal mobile banking system
  • 8. Phishing • masquerading trustworthy entity • email • Vishing • Smishing
  • 9. Sniffing • Passive sniffing o get information from communication medium • Active sniffing o inject packets into the traffic • Wi-fi Sniffing o sending data thats not encrypted • Use sniffer software
  • 10. Related Work : Intrusion Detection • Stephen and Wilson in their research paper proposed a detection technique based on global and local observations of user’s behavior • Karlsen and Killingberg designed and implemented an intrusion detection technique for internet banking systems based on profiles
  • 11. Intrusion Detection • Detect or identify an attempt to gain unauthorized access • Intrusion detection systems (IDS) • Two intrusion detection techniques o Anomaly Detection o Misuse Detection
  • 12. Current Intrusion Detection Techniques • User profile based intrusion detection technique o User's behavior to detect anomalies o User statistics, usage pattern, transaction amount • Drawbacks o Need considerable amount of data o Natural changes in usage pattern
  • 13. Our Approach Detection Profile Based Intrusion Detection • Composed of 5 models to form a session structure profile: o Usage patterns o Inter-request time delay o Session time o User statistics o Response
  • 14. Detection Data source: Transaction Log o Transactions performed by the user The session structure profile: o Will attempt to flag an unusual sequence of attempts o Classified unusual as an anomaly o Evaluate the interaction between the user and the application Analyzed by: Markov Chain
  • 15. Prevention Two Factor Authentication An approach which required the presentation of two or more of three factors. 1. Knowledge factor : defines something the user knows. 2. Possession factor : defines something the user has. 3. Inherence factor : defines something the user is.
  • 19. Transmission Phase • Details how user information is transmitted over the internet. • User has no control over medium of transmission. • All banking institutions use SSL/TLS encryption using SSL handshaking protocol. • Establishes a secure connection. • Certain research papers propose use of steganography as medium of transmission. • Existence of data is hidden within a data or audio file and transmitted to the banking server.
  • 21. Data Transfer • Data transactions can be transferred over the channel using secure WTLS protocols. • WTLS uses modern cryptographic algorithms, in common with TLS, allows negotiations of cryptographic suites between client and server. • The data transfer section handles actions and queries by users such as checking new balance, adding more money , depositing a cheque etc..
  • 22. Mutual Authentication • Two efficient ways, that the authentication notification can be made effective was through email and SMS. • Based on previous sections on intrusion detection we believe this adds to its enhancement as it serves as means of detection in-case of unauthorized access.
  • 23. Results : Prevention PROS • The use of speech approach as a mean of authentication currently has an error rate of less than 1% which has reduced from 33% in 2003. • A research paper published in 2010 by Shen, Zheng and Li provided statistical and modular data proving the effectiveness of voice recognition using GMM-UBM voice recognition approach. CONS • More work needs to be done on separating background noises from user speech.
  • 24. Results : Detection PROS • Session structure profile provides a total picture of the user’s behavior • Lead to the detection of a more general behavior rather than just simple individual values. CONS • The approach shows promising results but based on previous research some activities may pass as fraudulent.
  • 25. Conclusion • We discussed various types of attacks that occur on mobile devices, and attacks that occur specifically on the mobile banking. • We additionally discussed the current intrusion detection systems. • Finally, we proposed an authentication mechanism.
  • 26. Contributions • Alisa Pinchuk : o Selected relevant attacks on mobile banking applications , and provided a foundation which proved the solutions proposed will help reduce the occurrence of the attack. • Clinton D Souza: o Designed Two Factor authentication using PIN and Voice recognition based on recent studies and current authentication system implementation. • Rafael Santana: o Found very unique intrusion detections systems that are being proposed in the research community and which if implemented will assist banking systems in better protecting their servers and application which are deployed. • Tessy Sebastian: o Found very unique intrusion detections systems that are being proposed in the research community and which if implemented will assist banking systems in better protecting their servers and application which are deployed.
  • 27. References 1. Nie, J., & Hu, X. (2008). Mobile banking information security and protection methods. Retrieved from <http://ieeexplore.ieee.org.ezproxy1.lib.asu.edu/stamp/stamp.jsp?tp=&arnumber=4722412&tag=1>. (Nie & Hu, 2008) 2. Ruggiero , P., & Foote , J. (n.d.). Cyber threats to mobile phones. Retrieved from <http://www.us- cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf>. (Ruggiero & Foote) 3. Shen, L., Zheng, N., Zheng, S., & Li, W. (n.d.). Secure mobile services by face and speech based personal authentication. (Shen, Zheng, Zheng & Li) 4. Sanderson, C.; Bengio, S.; Bourlard, H.; Mariethoz, J.; Collobert, R.; BenZeghiba, M.F.; Cardinaux, F.; Marcel, S.; , "Speech & face based biometric authentication at IDIAP," Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on , vol.3, no., pp. III- 1-4 vol.3, 6-9 July 2003 5. Yang Wujian; Wu Yangkai; Chen Guanlin; , "Application of Voice Recognition for Mobile E-Commerce Security," Circuits, Communications and System (PACCS), 2011 Third Pacific-Asia Conference on , vol., no., pp.1-4, 17-18 July 2011 doi: 10.1109/PACCS.2011.5990286 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5990286&isnumber=5990080