Banking Malware Attacks and Security Solutions Review
DOI:
https://doi.org/10.54066/jpsi.v1i2.600Keywords:
Malware Attacks, Security, Network, Banking ThreatAbstract
This research explores the growing threat of banking malware attacks and the security solutions that can be implemented to mitigate the risks. The paper begins by providing an overview of the different banking malware attacks, including their propagation methods and the damage they can cause. It then delves into the various security measures that can be taken to prevent and detect these attacks, such as endpoint protection, network segmentation, and user education. The paper also examines the challenges and limitations of these security solutions and the potential for future developments in the field. Overall, this paper provides a comprehensive analysis of the current banking malware attacks and the security solutions that can be employed to safeguard against them. This research aims to comprehensively analyse the different types of banking malware attacks and the security solutions that can mitigate the risks. By understanding the nature of these attacks and the effectiveness of various security measures, this research can help financial institutions develop more effective strategies for protecting themselves and their customers from cyber threats.
References
Carminati, M., Polino, M., Continella, A., Lanzi, A., Maggi, F., & Zanero, S. (2018). Security Evaluation of a Banking Fraud Analysis System. ACM Transactions on Privacy and Security (TOPS), 21, 1–31.
Ghosh, S., Majumder, A., Goswami, J., Kumar, A., Mohanty, S. P., & Bhattacharyya, B. K. (2017). Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment. IEEE Consumer Electronics Magazine, 6(1), 82–93. https://doi.org/10.1109/MCE.2016.2614522
Grammatikakis, K.-P., Koufos, I., Kolokotronis, N., Vassilakis, C., & Shiaeles, S. (2021). Understanding and Mitigating Banking Trojans: From Zeus to Emotet. CoRR, abs/2109.01610. https://arxiv.org/abs/2109.01610
He, D., & Wang, D. (2015). Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Systems Journal, 9(3), 816–823. https://doi.org/10.1109/JSYST.2014.2301517
Hu, W., & Tan, Y. (2017). Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR, abs/1702.05983. http://arxiv.org/abs/1702.05983
Kiljan, S., Simoens, K., Cock, D. De, van Eekelen, M. C. J. D., & Vranken, H. P. E. (2016). A Survey of Authentication and Communications Security in Online Banking. ACM Computing Surveys (CSUR), 49, 1–35.
Lin, H., Wen, F., & Du, C. (2015). An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics. Wireless Personal Communications, 84(4), 2351–2362. https://doi.org/10.1007/s11277-015-2708-4
Lu Yanrong AND Li, L. A. N. D. Y. X. A. N. D. Y. Y. (2015). Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards. PLOS ONE, 10(5), 1–13. https://doi.org/10.1371/journal.pone.0126323
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508. https://doi.org/10.1007/s11277-015-2699-1
Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552. https://doi.org/10.1109/TC.2002.1004593
Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1), 214–222. https://doi.org/https://doi.org/10.1016/j.mcm.2011.04.036
Perwej, Dr. Y., Abbas, Q., Dixit, J., Akhtar, N., & Jaiswal, A. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, Volume 9, Pages 669-710. https://doi.org/10.18535/ijsrm/v9i12.ec04
Proffitt, T. (2013). Indicators of compromise in memory forensics GIAC ( GCFA ) Gold Certification.
Qi, X., Tang, Y., Wang, H., Liu, T., & Jing, J. (2022). Adversarial Example Attacks Against Intelligent Malware Detection: A Survey. 2022 4th International Conference on Applied Machine Learning (ICAML), 1–7.
Ross, R., Pillitteri, V., & Dempsey, K. (2022). SP 800-172A, Assessing Enhanced Security Requirements for CUI CSRC.
Wang Chengqi AND Zhang, X. A. N. D. Z. Z. (2016). Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme. PLOS ONE, 11(2), 1–25. https://doi.org/10.1371/journal.pone.0149173
Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wireless Personal Communications, 74(2), 601–614. https://doi.org/10.1007/s11277-013-1309-3
Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications, 78(1), 247–269. https://doi.org/10.1007/s11277-014-1750-y
Zhao, J., Masood, R., & Seneviratne, S. (2021). A Review of Computer Vision Methods in Network Security. IEEE Communications Surveys & Tutorials, 23(3), 1838–1878. https://doi.org/10.1109/COMST.2021.3086475