際際滷

際際滷Share a Scribd company logo
SECURE INTERNET
    BANKING
AUTHENTICATION




 AAR T H I K AN N AP P AN
      D H IV Y AA.R
  M AH A L AK S H M I.S
Network Security
              c tion           Offline cr
        trod u                            edential
     In             Attacks on
Onl                                Sho
    ine             authentication     rt t
           cha                              ime
                                                pwd
                 nn
                 el         Abstract
                                                   nomy
    bjec tives                           k t   axo
   o                            At   tac
           Conclusion
                                                  sol ution
                                        based
                                f icate
                          Certi                      2
PRESENTATION OBJECTIVES
 Understand network security services

 Be aware of vulnerabilities and threats

 Realize why network security is necessary

 Highly attractive solution for valuable and
  secure future.

                                            3
ABSTRACT

The authors present two challenge response Internet
banking authentication solutions
   one based on short-time passwords

   and one on certificates

attacks on authentication

transaction-signing option



                                                       4
INTRODUCTION

 The Internet is an integral part of our
  daily lives, and the proportion of people
  who expect to be able to manage their
  bank accounts anywhere, anytime is
  constantly growing
 This article describes current
  Authentication threats and two proposed
  solutions as well as how these solutions
  can be extended in the face of more
  complex future attacks

                                              5
ATTACKS ON AUTHENTICATION
 Internet banking systems must
  authenticate users before granting
  them access to particular services.
 successful authentication
  eventually enables users to access
  their private information. We can
  classify all Internet banking
  authentication methods according
  to their resistance to two types of
  common attacks
 offline credential-stealing
  attacks
 online channel-breaking
  attacks
                                        6
Offline credential-stealing attacks
 Security precautions can
  help users protect
  themselves from
  malicious software.
 For example-- installing
  and maintaining a
  firewall and up-to date
  antivirus software,
  regularly applying
  operating system and
  browser patches


                                7
Online channel-breaking attack
 The intruder noticeably
intercepts messages between
   the client PC and the
   banking server by
   masquerading as the server
   to the client and vice versa
 Online channel-breaking
attacks dont necessarily
   compromise the users
   credentials but the
   sessions credentials and
   therefore typically require
   the user-initiated banking     8
   session to work properly.
AN ATTACK TAXONOMY




Taxonomy of Internet banking authentication methods. Methods
are classified according to their resistance against offline   9
credential-stealing and online channel-breaking attacks.
SHORT-TIME PASSWORD
                SOLUTION
 It uses symmetric cryptography in combination with a hardware
  security module .

 User authentication works as follows:
4. The user connects to the Internet banking
5. The user claims his or her identity by entering an account number
   in the banks login form
6. The user opens his or her smart card by entering the corresponding
   PIN in the reader before entering the given challenge.
7. The user manually copies the shown response to the banks login
   form to be checked by the banks authentication server.

                                                                10
The Need for Web Security   11
CERTIFICATE-BASED SOLUTION

User authentication works as
follows.
 First, the user establishes an
SSL/TLS channel between
the user PC and
the banks Web server by
setting up an SSL/TLS
session without client
authentication.
Once the card is available,
its certificates become visible
in the Web browser.
                                   12
Conclusion
  Internet banking has turned into
  an arms race between financial
  institutions and public network
  attackers.

  Both solutions offer high
  security against common attacks.

  However, changing legislation
  and the eventually spread of e-IDs
  among customers makes this
  solution a highly attractive and
  valuable alternative for the future.
                                 13
THANK YOU


     Network
      security!!!!!!!!




                         14
Ad

Recommended

this is test for today
this is test for today
DreamMalar
Pay Forum Conference
Pay Forum Conference
hagero
Ynamono Hs Lecture
Ynamono Hs Lecture
ynamoto
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
csandit
Sms based otp
Sms based otp
Hai Nguyen
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
Snehith
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
Hai Nguyen
E voting authentication with qr-codes
E voting authentication with qr-codes
Md. Hasibur Rashid
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
Iaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
Jips v07 no1_paper17
Jips v07 no1_paper17
Hai Nguyen
E0962833
E0962833
IOSR Journals
Toward Better Password Requirements
Toward Better Password Requirements
Jim Fenton
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
wed
wed
DreamMalar
dfsd
dfsd
DreamMalar
this is test for download option
this is test for download option
DreamMalar
the
the
DreamMalar
de
de
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar

More Related Content

What's hot (8)

HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
Iaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
Jips v07 no1_paper17
Jips v07 no1_paper17
Hai Nguyen
E0962833
E0962833
IOSR Journals
Toward Better Password Requirements
Toward Better Password Requirements
Jim Fenton
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
Iaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
Jips v07 no1_paper17
Jips v07 no1_paper17
Hai Nguyen
Toward Better Password Requirements
Toward Better Password Requirements
Jim Fenton
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9

Similar to ds (20)

wed
wed
DreamMalar
dfsd
dfsd
DreamMalar
this is test for download option
this is test for download option
DreamMalar
the
the
DreamMalar
de
de
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
jameschloejames
sample.ppt
sample.ppt
DreamMalar
PPT
PPT
Bhavani Testone
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
Bhavani Testone
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
this is test for download option
this is test for download option
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
Ad

More from DreamMalar (20)

Latest PPT.pptx
Latest PPT.pptx
DreamMalar
example.pdf
example.pdf
DreamMalar
example.pdf
example.pdf
DreamMalar
tag
tag
DreamMalar
tag
tag
DreamMalar
example.pdf
example.pdf
DreamMalar
LAtest Doc
LAtest Doc
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
newdocument.txt
newdocument.txt
DreamMalar
Sample.ppt
Sample.ppt
DreamMalar
not from widget
not from widget
DreamMalar
Document.docx.docx
Document.docx.docx
DreamMalar
content list check
content list check
DreamMalar
PDF2.pdf
PDF2.pdf
DreamMalar
1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf
DreamMalar
Latest PPT.pptx
Latest PPT.pptx
DreamMalar
example.pdf
example.pdf
DreamMalar
example.pdf
example.pdf
DreamMalar
example.pdf
example.pdf
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
Presentation1.PPTX
Presentation1.PPTX
DreamMalar
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
newdocument.txt
newdocument.txt
DreamMalar
not from widget
not from widget
DreamMalar
Document.docx.docx
Document.docx.docx
DreamMalar
content list check
content list check
DreamMalar
1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf
DreamMalar
Ad

ds

  • 1. SECURE INTERNET BANKING AUTHENTICATION AAR T H I K AN N AP P AN D H IV Y AA.R M AH A L AK S H M I.S
  • 2. Network Security c tion Offline cr trod u edential In Attacks on Onl Sho ine authentication rt t cha ime pwd nn el Abstract nomy bjec tives k t axo o At tac Conclusion sol ution based f icate Certi 2
  • 3. PRESENTATION OBJECTIVES Understand network security services Be aware of vulnerabilities and threats Realize why network security is necessary Highly attractive solution for valuable and secure future. 3
  • 4. ABSTRACT The authors present two challenge response Internet banking authentication solutions one based on short-time passwords and one on certificates attacks on authentication transaction-signing option 4
  • 5. INTRODUCTION The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks 5
  • 6. ATTACKS ON AUTHENTICATION Internet banking systems must authenticate users before granting them access to particular services. successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks offline credential-stealing attacks online channel-breaking attacks 6
  • 7. Offline credential-stealing attacks Security precautions can help users protect themselves from malicious software. For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
  • 8. Online channel-breaking attack The intruder noticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa Online channel-breaking attacks dont necessarily compromise the users credentials but the sessions credentials and therefore typically require the user-initiated banking 8 session to work properly.
  • 9. AN ATTACK TAXONOMY Taxonomy of Internet banking authentication methods. Methods are classified according to their resistance against offline 9 credential-stealing and online channel-breaking attacks.
  • 10. SHORT-TIME PASSWORD SOLUTION It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows: 4. The user connects to the Internet banking 5. The user claims his or her identity by entering an account number in the banks login form 6. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge. 7. The user manually copies the shown response to the banks login form to be checked by the banks authentication server. 10
  • 11. The Need for Web Security 11
  • 12. CERTIFICATE-BASED SOLUTION User authentication works as follows. First, the user establishes an SSL/TLS channel between the user PC and the banks Web server by setting up an SSL/TLS session without client authentication. Once the card is available, its certificates become visible in the Web browser. 12
  • 13. Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future. 13
  • 14. THANK YOU Network security!!!!!!!! 14

Editor's Notes

  • #6: This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities. updated 2000-08-07
  • #14: Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability