Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks
Keywords:
digital forensic, IP traceback technique, financial network, financial institutions, biometric ATMs, online handwriting signatures, signature authentication, signature verification, critical segmentAbstract
Major bank hacking cases and bank robbery is reported constantly. The digital forensic evidence is the most important thing for incident response. Therefore, this paper proposes IP (Internet Protocol) traceback technique for better digital forensic. The paper considers one of the most important components in the modern banking system, namely the direction related to ensuring the security of customer data. The number of bank cards is rapidly growing, and accordingly the network of automated teller machines (ATMs). There are smart cards, which provide higher reliability than cards with a magnetic line. This system allows the issuance of money to the client only when scanning his face. The explosive usage of mobile devices enables conducting electronic transactions involving direct signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. This paper proposes a critical segment based online signature verification system to secure mobile transactions on multi-touch mobile devices. The system extracts useful features from a user’s signature that describe both the geometric layout of the signature as well as behavioral and physiological characteristics in the user’s signing process. The experimental evaluation provide signature verification and robust to signature forging attacks.
References
[1] Sungmoon Kwon, Jaehan Jeong, Taeshik Shon. Digital Forensic Readiness for Financial Network, 2019 International Conference on Platform Technology and Service (PlatCon), 2019 IEEE.
[2] Alexey V. Bataev. The Model of Assessing Economic Efficiency of Biometric ATMs, 2019 IEEE, pp. 1365-1370.
[3] Yanzhi Ren, Chen Wang, Yingying Chen. Signature Verification Using Critical Segments for Securing Mobile Transactions, 2018 IEEE, pp. 1536-1233
[4] Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson. Practical Network Support for IP Traceback, 2000
[5] Andrey Belenky, Nirwan Ansari. IP Traceback With Deterministic Packet Marking, 2003 IEEE, pp. 62-64
[6] Christiawan, Bayu Aji Sahar, Azel Fayyad Rahardian, Elvayandri Muchtar. Fingershield ATM – ATM Security System using Fingerprint Authentication.
[7] Guang Yao, Jun Bi, Athanasios V. Vasilakos. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter. 2014 IEEE
[8] G. Renee Jebaline, S. Gomathi. A Novel Method to Enhance the Security of ATM using Biometrics, 2015 [ICCPCT]
[9] H. Lasisi, A.A. Ajisafe. Development of Stripe Biometric based Fingerprint Authentications Systems in Automated Teller Machines, 2012 [ACTEA]
[10] Akio Ogihara, Hiroyuki Matsumura, Akira Shiozaki. Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication, 2016 [ISPACS]
[11] Apurva Taralekar, Gopalsingh Chouhan, Rutuja Tangade, Nikhilkumar Shardoor. One Touch Multi-banking Transaction ATM System using Biometric and GSM Authentication. 2017 (BID)
[12] Christian Gruber, Thiemo Gruber, Sebastian Krinninger, Bernhard Sick. Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions, 2009 IEEE
[13] Donato Impedovo and Giuseppe Pirlo, Automatic Signature Verification: The State of the Art, 2008 IEEE
[14] Napa Sae-Bae, Nasir Memon, Online Signature Verification on Mobile Devices, 2014 IEEE
[15] J. Sun, R. Zhang, J. Zhang, Y. Zhang. Touchin: Sightless two factor authentication on multi-touch mobile devices, in Proceedings of CNS, 2014.
[16] N. L. Clarke, S. Furnell. Authentication of users on mobile telephones - a survey of attitudes and practices, Computers and Security, 2005.
[17] T. Clancy, N. Kiyavash, and D. Lin. Secure smartcard-based fingerprint authentication in Proceedings of the ACM SIGMM workshop on Biometrics methods and applications, 2003.
[18] G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, A. de Santos Sierra. Analysis of pattern recognition techniques for in-air signature biometrics, Pattern Recognition, 2011.
[19] M. Shahzad, A. X. Liu, A. Samuel. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you cannot do it, in Proceedings of ACM MobiCom, 2013.
[20] Yao, Guang, Jun Bi, Athanasios V. Vasilakos. Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter, IEEE Transactions on Information Forensics and Security 10.3 (2015): 471-484.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
