Open Access   Article Go Back

Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks

awanraj S P1 , Prasanna Kumar M2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 349-355, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.349355

Online published on May 16, 2019

Copyright © Pawanraj S P, Prasanna Kumar M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pawanraj S P, Prasanna Kumar M, “Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.349-355, 2019.

MLA Style Citation: Pawanraj S P, Prasanna Kumar M "Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks." International Journal of Computer Sciences and Engineering 07.15 (2019): 349-355.

APA Style Citation: Pawanraj S P, Prasanna Kumar M, (2019). Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks. International Journal of Computer Sciences and Engineering, 07(15), 349-355.

BibTex Style Citation:
@article{P_2019,
author = {Pawanraj S P, Prasanna Kumar M},
title = {Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {349-355},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1258},
doi = {https://doi.org/10.26438/ijcse/v7i15.349355}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.349355}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1258
TI - Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Pawanraj S P, Prasanna Kumar M
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 349-355
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Major bank hacking cases and bank robbery is reported constantly. The digital forensic evidence is the most important thing for incident response. Therefore, this paper proposes IP (Internet Protocol) traceback technique for better digital forensic. The paper considers one of the most important components in the modern banking system, namely the direction related to ensuring the security of customer data. The number of bank cards is rapidly growing, and accordingly the network of automated teller machines (ATMs). There are smart cards, which provide higher reliability than cards with a magnetic line. This system allows the issuance of money to the client only when scanning his face. The explosive usage of mobile devices enables conducting electronic transactions involving direct signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. This paper proposes a critical segment based online signature verification system to secure mobile transactions on multi-touch mobile devices. The system extracts useful features from a user’s signature that describe both the geometric layout of the signature as well as behavioral and physiological characteristics in the user’s signing process. The experimental evaluation provide signature verification and robust to signature forging attacks.

Key-Words / Index Term

digital forensic, IP traceback technique, financial network, financial institutions; biometric ATMs, online handwriting signatures, signature authentication, signature verification, critical segment

References

[1]. Sungmoon Kwon, Jaehan Jeong, Taeshik Shon. Digital Forensic Readiness for Financial Network, 2019 International Conference on Platform Technology and Service (PlatCon), 2019 IEEE.
[2]. Alexey V. Bataev. The Model of Assessing Economic Efficiency of Biometric ATMs, 2019 IEEE, pp. 1365-1370.
[3]. Yanzhi Ren, Chen Wang, Yingying Chen. Signature Verification Using Critical Segments for Securing Mobile Transactions, 2018 IEEE, pp. 1536-1233
[4]. Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson. Practical Network Support for IP Traceback, 2000
[5]. Andrey Belenky, Nirwan Ansari. IP Traceback With Deterministic Packet Marking, 2003 IEEE, pp. 62-64
[6]. Christiawan, Bayu Aji Sahar, Azel Fayyad Rahardian, Elvayandri Muchtar. Fingershield ATM – ATM Security System using Fingerprint Authentication.
[7]. Guang Yao, Jun Bi, Athanasios V. Vasilakos. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter. 2014 IEEE
[8]. G. Renee Jebaline, S. Gomathi. A Novel Method to Enhance the Security of ATM using Biometrics, 2015 [ICCPCT]
[9]. H. Lasisi, A.A. Ajisafe. Development of Stripe Biometric based Fingerprint Authentications Systems in Automated Teller Machines, 2012 [ACTEA]
[10]. Akio Ogihara, Hiroyuki Matsumura, Akira Shiozaki. Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication, 2016 [ISPACS]
[11]. Apurva Taralekar, Gopalsingh Chouhan, Rutuja Tangade, Nikhilkumar Shardoor. One Touch Multi-banking Transaction ATM System using Biometric and GSM Authentication. 2017 (BID)
[12]. Christian Gruber, Thiemo Gruber, Sebastian Krinninger, Bernhard Sick. Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions, 2009 IEEE
[13]. Donato Impedovo and Giuseppe Pirlo, Automatic Signature Verification: The State of the Art, 2008 IEEE
[14]. Napa Sae-Bae, Nasir Memon, Online Signature Verification on Mobile Devices, 2014 IEEE
[15]. J. Sun, R. Zhang, J. Zhang, Y. Zhang. Touchin: Sightless two factor authentication on multi-touch mobile devices, in Proceedings of CNS, 2014.
[16]. N. L. Clarke, S. Furnell. Authentication of users on mobile telephones - a survey of attitudes and practices, Computers and Security, 2005.
[17]. T. Clancy, N. Kiyavash, and D. Lin. Secure smartcard-based fingerprint authentication in Proceedings of the ACM SIGMM workshop on Biometrics methods and applications, 2003.
[18]. G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, A. de Santos Sierra. Analysis of pattern recognition techniques for in-air signature biometrics, Pattern Recognition, 2011.
[19]. M. Shahzad, A. X. Liu, A. Samuel. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you cannot do it, in Proceedings of ACM MobiCom, 2013.
[20]. Yao, Guang, Jun Bi, Athanasios V. Vasilakos. Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter, IEEE Transactions on Information Forensics and Security 10.3 (2015): 471-484.