Open Access Open Access  Restricted Access Subscription or Fee Access

Reduce Crime Attacks on Online Transactions Using Biometric Identifier and OTP

B. Pavithra, N. Kanya

Abstract


The development in electronic communication has resulted in a bigger demand for speedy and precise user recognition and verification. Access codes for building, bank financial records and computer systems frequently employ personal identification numbers (PIN's) for recognition and security verifications. Traditional method of identification based on possession of ID cards or elite information  like a social security number or a password are not all together dependable. To enlarge the security in the authentication process Biometric authentication and other digital signatures are used even though they give the successful authentication they are feeble against online attacks like botnet, malware, Intruders, spoofing ECT. In this scheme fingerprint biometric technique and Onetime password is used for well-organized authentication and anti-spoofing, Intruder detection system, DIKE key exchange and encryption technique to give efficient security against online attacks.


Keywords


Biometrics, DIKE, OTP, Malware Detection, Botnet Detection

Full Text:

PDF

References


Boukerche and M.S.M.A. Notare, "Behavior-Based Intrusion Detection in Mobile Phone Systems," J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.

Boukerche, K.R.L. Juc, J.B. Sobral and M.S.M.A. Notare, "An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems," Parallel Computing, vol. 30, nos. 5/6, pp.629-646, 2004.

M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian and J.Nazario "Automateclassification and analysis of internt malware", Proc. RAID 2007, LNCS, vol. 4637, pp.178 -197

M. Christodorescu, S. Jha and C Kruegel "Mining specifications of Malicious behavior", Proc. ESEC/FSE-2007, pp.5 -14

Pennam Krishnamurthy & M. Maddhusudhan Redddy, “Implementation Of ATM Security by Using Fingerprint recognition and GSM “InternationalJournal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249–071X, 2012.

Vinod kumar, & Prof.M R K Murthy “Fingerprint Based ATM Security by using ARM7” IOSR Journal of Electronics and Communication Engineering ISSN: 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012), PP 26-28.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.