Paper Type |
: |
Research Paper |
Title |
: |
Mobile Banking Adeptness on Man-In-The-Middle and Man-In-The-Browser Attacks |
Country |
: |
India |
Authors |
: |
P.S.Jagadeesh Kumar || Wenli Hu || Xianpei Li || Kundan Lal |
|
: |
10.9790/0050-04021319 |
ABSTRACT: A brand new category of perilous threat, asphyxiate the browser behavior in line of attack similar to that of Trojan horses. These immaculate varieties of Trojan horses can acclimatize the banking transaction activities, as they are muddled in browsers on top of mobile banking applications, and exhibit the user's transactions. Primarily, they are man-in-the-middle (MITM) attacks pedestal on users illuminating their testament on a deceptive website and man-in-the-browser (MITB) attacks that modify the exterior of indenture in the user's browser......
Keywords: Man-In-The-Middle (MITM), Man-In-The-Browser (MITB), Mobile Banking, Phishing Attack
[1] Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier, "Mobile Authentication Secure Against Man-In-The-Middle Attacks," 11th International Conference on Mobile Systems and Pervasive Computing, Procedia Computer Science 34, pp.323 – 329, Elsevier 2014.
[2] P.S.Jagadeesh Kumar, S.Meenakshi Sundaram, Ranjeet Kumar, "An Intellect Learning on E-mail Security and Fraud, Spam and Phishing," International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.5, September, pp.49-67, 2015.
[3] Timothy Dougan, Kevin Curran, "Man in the Browser Attacks," International Journal of Ambient Computing and Intelligence, 4(1), pp.29-39, March 2012.
[4] Veelasha Moonsamy, Lynn, "Mitigating man-in-the-middle attacks on smartphones: a discussion of SSL pinning and DNSSec," 12th Australian Information Security Management Conference, 2014.
[5] Candid Wuest, "Phishing in the Middle of the Stream - Today's Threats to Online Banking," Proceedings of the AVAR 2005 Conference.