Open Access Open Access  Restricted Access Subscription Access

Secure KBAM for Internet Banking to Avoid Phishing Attacks

Vinoth M

Abstract


A group of interconnected banks with branches provide a set of services under the Core Banking System. From any member branch, customers of the bank can access their funds and conduct other straightforward transactions. Credibility among customers is the primary issue with core banking. It is impossible to trust information found on the Internet because databases can be hacked. The proposed system is based on a click-based graphical password system that guides and assists users in choosing passwords and distributes them more randomly to solve this authentication issue. You will be asked to select the supplied password. The proposed system is based on methods of persuasion that get people to behave in a certain way. To increase the security of the authentication system, the proposed system combines compelling features with clues. During the process of creating a password, difficult-to-guess areas of the image are highlighted, and the user is required to select a click point within the highlighted area. On the off chance that the client can't choose a tick point, they can move to the following featured region.


Full Text:

PDF

References


Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.".

O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2021-2040.

Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: a tool for information security. IEEE transactions on information forensics and security, 1(2), 125-143.

Blonder, G. E. (1996). Graphical passwords. in lucent technologies, inc., murray hill, nj, us patent, ed. united states.

Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International journal of human-computer studies, 63(1-2), 102-127.


Refbacks

  • There are currently no refbacks.