SlideShare a Scribd company logo
1 of 14
SECURE INTERNET
    BANKING
 AUTHENTICATION




  AARTHI KANNAPPAN
      DHIVYAA.R
   MAHA LAKSHMI.S
Network Security
             c tion            Offline cre
       trodu                                dential
    In             Attacks on
Onl                                Sho
   ine             authentication     rt t
          cha                              ime
                                               pwd
                nnel     Abstract
                                                  omy
         tives                                xon
    objec                        At tack
                                           ta

           Conclusion
                                                      l u ti o n
                                                 ed so
                                       t e bas
                            Ce rtifica
                                                           2
PRESENTATION
          OBJECTIVES
 Understand network security services

 Be aware of vulnerabilities and threats

 Realize why network security is necessary

 Highly attractive solution for valuable and
  secure future.

                                            3
ABSTRACT

The authors present two challenge response Internet
banking authentication solutions
   one based on short-time passwords

   and one on certificates

attacks on authentication

transaction-signing option



                                                       4
INTRODUCTION

 The Internet is an integral part of our
  daily lives, and the proportion of people
  who expect to be able to manage their
  bank accounts anywhere, anytime is
  constantly growing
 This article describes current
  Authentication threats and two proposed
  solutions as well as how these solutions
  can be extended in the face of more
  complex future attacks

                                              5
ATTACKS ON AUTHENTICATION
 Internet banking systems must
  authenticate users before granting
  them access to particular services.
 successful authentication
  eventually enables users to access
  their private information. We can
  classify all Internet banking
  authentication methods according
  to their resistance to two types of
  common attacks
 offline credential-stealing
  attacks
 online channel-breaking
  attacks
                                        6
Offline credential-stealing attacks
 Security precautions can
  help users protect
  themselves from
  malicious software.
 For example-- installing
  and maintaining a
  firewall and up-to date
  antivirus software,
  regularly applying
  operating system and
  browser patches


                                7
Online channel-breaking attack
 The intruder noticeably
intercepts messages between
   the client PC and the
   banking server by
   masquerading as the server
   to the client and vice versa
 Online channel-breaking
attacks don’t necessarily
   compromise the user’s
   credentials but the
   session’s credentials and
   therefore typically require
   the user-initiated banking     8
   session to work properly.
AN ATTACK TAXONOMY




Taxonomy of Internet banking authentication methods. Methods
are classified according to their resistance against offline   9
credential-stealing and online channel-breaking attacks .
SHORT-TIME PASSWORD
                SOLUTION
 It uses symmetric cryptography in combination with a hardware
  security module .

 User authentication works as follows:
1. The user connects to the Internet banking
2. The user claims his or her identity by entering an account number
   in the bank’s login form
3. The user opens his or her smart card by entering the corresponding
   PIN in the reader before entering the given challenge.
4. The user manually copies the shown response to the bank’s login
   form to be checked by the bank’s authentication server.

                                                                10
The Need for Web Security   11
CERTIFICATE-BASED SOLUTION

User authentication works as
follows.
 First, the user establishes an
SSL/TLS channel between
the user PC and
the bank’s Web server by
setting up an SSL/TLS
session without client
authentication.
Once the card is available,
its certificates become visible
in the Web browser.
                                   12
Conclusion
   Internet banking has turned into
   an arms race between financial
   institutions and public network
   attackers.

   Both solutions offer high
   security against common attacks.

   However, changing legislation
   and the eventually spread of e-IDs
   among customers makes this
   solution a highly attractive and
   valuable alternative for the future.
                                  13
THANK YOU


     Network
      security!!!!!!!!




                         14

More Related Content

What's hot

Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsHeinrich Seeger
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationArun S M
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordChandrapriya Rediex
 
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...IJNSA Journal
 

What's hot (8)

325 330
325 330325 330
325 330
 
Key2 share moosecon
Key2 share mooseconKey2 share moosecon
Key2 share moosecon
 
Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile Crowds
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 

Viewers also liked

Increased Mobile Phone Use and Internet Access
Increased Mobile Phone Use and Internet AccessIncreased Mobile Phone Use and Internet Access
Increased Mobile Phone Use and Internet AccessCaldwell Nkhwalume
 
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...BIBHUTI BHUSAN SAMANTARAY
 
Video is Hot. Your Site is Cold. Let's Fix That.
Video is Hot. Your Site is Cold. Let's Fix That.Video is Hot. Your Site is Cold. Let's Fix That.
Video is Hot. Your Site is Cold. Let's Fix That.dolanpro
 
WS 1C-3 - Planning Open Streets from within City Govt. - San Jose
WS 1C-3 - Planning Open Streets from within City Govt. - San JoseWS 1C-3 - Planning Open Streets from within City Govt. - San Jose
WS 1C-3 - Planning Open Streets from within City Govt. - San JoseTheOpenStreetsProject
 
Trabajo virtual tercer corte
Trabajo virtual tercer corteTrabajo virtual tercer corte
Trabajo virtual tercer corteLuis Eduardo
 
ασκησεισ δομησ
ασκησεισ δομησασκησεισ δομησ
ασκησεισ δομησtsiak
 
Presentación1
Presentación1Presentación1
Presentación1pangaba09
 
Alex Clewlow CV.DOCX
Alex Clewlow CV.DOCXAlex Clewlow CV.DOCX
Alex Clewlow CV.DOCXAlex Clewlow
 
Marketing Consultant & Events Manager
Marketing Consultant & Events ManagerMarketing Consultant & Events Manager
Marketing Consultant & Events Managerfairouzmg
 
Presentacion del capitulo 9 de fisica
Presentacion del capitulo 9 de fisicaPresentacion del capitulo 9 de fisica
Presentacion del capitulo 9 de fisicagomezyguerrero
 
Handbook2011-2012
Handbook2011-2012Handbook2011-2012
Handbook2011-2012wsh205
 
Portafolio de trabajo
Portafolio de trabajoPortafolio de trabajo
Portafolio de trabajonoraeherrera
 
Tiposdeautoestima
TiposdeautoestimaTiposdeautoestima
TiposdeautoestimaCompa01
 

Viewers also liked (20)

Increased Mobile Phone Use and Internet Access
Increased Mobile Phone Use and Internet AccessIncreased Mobile Phone Use and Internet Access
Increased Mobile Phone Use and Internet Access
 
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...
PREPARATION OF BRIQUETTE IN AN INNOVATIVE AND COST EFFECTIVE WAY AND ITS TEST...
 
Video is Hot. Your Site is Cold. Let's Fix That.
Video is Hot. Your Site is Cold. Let's Fix That.Video is Hot. Your Site is Cold. Let's Fix That.
Video is Hot. Your Site is Cold. Let's Fix That.
 
WS 1C-3 - Planning Open Streets from within City Govt. - San Jose
WS 1C-3 - Planning Open Streets from within City Govt. - San JoseWS 1C-3 - Planning Open Streets from within City Govt. - San Jose
WS 1C-3 - Planning Open Streets from within City Govt. - San Jose
 
A la tierra
A la tierraA la tierra
A la tierra
 
Trabajo virtual tercer corte
Trabajo virtual tercer corteTrabajo virtual tercer corte
Trabajo virtual tercer corte
 
ασκησεισ δομησ
ασκησεισ δομησασκησεισ δομησ
ασκησεισ δομησ
 
Protestas.
Protestas.Protestas.
Protestas.
 
Presentación1
Presentación1Presentación1
Presentación1
 
Alex Clewlow CV.DOCX
Alex Clewlow CV.DOCXAlex Clewlow CV.DOCX
Alex Clewlow CV.DOCX
 
Reliably Solving Intractable Problems
Reliably Solving Intractable ProblemsReliably Solving Intractable Problems
Reliably Solving Intractable Problems
 
Marketing Consultant & Events Manager
Marketing Consultant & Events ManagerMarketing Consultant & Events Manager
Marketing Consultant & Events Manager
 
Presentacion del capitulo 9 de fisica
Presentacion del capitulo 9 de fisicaPresentacion del capitulo 9 de fisica
Presentacion del capitulo 9 de fisica
 
Handbook2011-2012
Handbook2011-2012Handbook2011-2012
Handbook2011-2012
 
Recull de premsa #Figueres - 10/11/2016
Recull de premsa #Figueres - 10/11/2016Recull de premsa #Figueres - 10/11/2016
Recull de premsa #Figueres - 10/11/2016
 
Video juegos
Video juegosVideo juegos
Video juegos
 
春風伴我行
春風伴我行春風伴我行
春風伴我行
 
Portafolio de trabajo
Portafolio de trabajoPortafolio de trabajo
Portafolio de trabajo
 
Homem: modo de uso!
Homem: modo de uso!Homem: modo de uso!
Homem: modo de uso!
 
Tiposdeautoestima
TiposdeautoestimaTiposdeautoestima
Tiposdeautoestima
 

Similar to dfsd (20)

wed
wedwed
wed
 
sad
sadsad
sad
 
one
oneone
one
 
disabled
disableddisabled
disabled
 
qa
qaqa
qa
 
Production verification
Production verificationProduction verification
Production verification
 
test 20072012
test 20072012test 20072012
test 20072012
 
test
testtest
test
 
ds
dsds
ds
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 

More from DreamMalar

More from DreamMalar (20)

AQ
AQAQ
AQ
 
Latest PPT.pptx
Latest PPT.pptxLatest PPT.pptx
Latest PPT.pptx
 
example.pdf
example.pdfexample.pdf
example.pdf
 
example.pdf
example.pdfexample.pdf
example.pdf
 
tag
tagtag
tag
 
tag
tagtag
tag
 
example.pdf
example.pdfexample.pdf
example.pdf
 
LAtest Doc
LAtest DocLAtest Doc
LAtest Doc
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
newdocument.txt
newdocument.txtnewdocument.txt
newdocument.txt
 
Sample.ppt
Sample.pptSample.ppt
Sample.ppt
 
not from widget
not from widgetnot from widget
not from widget
 
Document.docx.docx
Document.docx.docxDocument.docx.docx
Document.docx.docx
 
content list check
content list checkcontent list check
content list check
 
PDF2.pdf
PDF2.pdfPDF2.pdf
PDF2.pdf
 
1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 

dfsd

  • 1. SECURE INTERNET BANKING AUTHENTICATION AARTHI KANNAPPAN DHIVYAA.R MAHA LAKSHMI.S
  • 2. Network Security c tion Offline cre trodu dential In Attacks on Onl Sho ine authentication rt t cha ime pwd nnel Abstract omy tives xon objec At tack ta Conclusion l u ti o n ed so t e bas Ce rtifica 2
  • 3. PRESENTATION OBJECTIVES  Understand network security services  Be aware of vulnerabilities and threats  Realize why network security is necessary  Highly attractive solution for valuable and secure future. 3
  • 4. ABSTRACT The authors present two challenge response Internet banking authentication solutions  one based on short-time passwords  and one on certificates attacks on authentication transaction-signing option 4
  • 5. INTRODUCTION  The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing  This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks 5
  • 6. ATTACKS ON AUTHENTICATION  Internet banking systems must authenticate users before granting them access to particular services.  successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks  offline credential-stealing attacks  online channel-breaking attacks 6
  • 7. Offline credential-stealing attacks  Security precautions can help users protect themselves from malicious software.  For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
  • 8. Online channel-breaking attack  The intruder noticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa  Online channel-breaking attacks don’t necessarily compromise the user’s credentials but the session’s credentials and therefore typically require the user-initiated banking 8 session to work properly.
  • 9. AN ATTACK TAXONOMY Taxonomy of Internet banking authentication methods. Methods are classified according to their resistance against offline 9 credential-stealing and online channel-breaking attacks .
  • 10. SHORT-TIME PASSWORD SOLUTION  It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows: 1. The user connects to the Internet banking 2. The user claims his or her identity by entering an account number in the bank’s login form 3. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge. 4. The user manually copies the shown response to the bank’s login form to be checked by the bank’s authentication server. 10
  • 11. The Need for Web Security 11
  • 12. CERTIFICATE-BASED SOLUTION User authentication works as follows.  First, the user establishes an SSL/TLS channel between the user PC and the bank’s Web server by setting up an SSL/TLS session without client authentication. Once the card is available, its certificates become visible in the Web browser. 12
  • 13. Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future. 13
  • 14. THANK YOU Network security!!!!!!!! 14

Editor's Notes

  1. This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities. updated 2000-08-07
  2. Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability