Affiliation:
1. Southwest Jiaotong University
2. King Saud University
Abstract
Abstract
Cyber threats in online banking services are increasing with the improvements in internet-aided communications and extended services. The threats gather personal and transactional information from the users from which illegitimate services are handled. For providing secure service-based risk mitigation, this article introduces a Volatile Transaction Authentication Insurance Method (VTAIM). This method generates volatile insurance authenticity for a transaction-initiated session. Depending on the transaction features, the insurance is constructed using a two-way volatile authentication key. This key extension/ validity is recommended through deep learning based on the user transaction interest. The type of security threat is first detected from the session interruptions and converging transaction period. Post the detection, the user and banking service-oriented authentication is used for ensuring end-to-end security. This recommendation is used for typical consecutive transactions and volatile security. The security features are updated periodically based on service availability and transaction support provided. Therefore, spoofed services are less available for distinct users across different time intervals, reducing the false rate and failures.
Publisher
Research Square Platform LLC
Reference30 articles.
1. A decentralized autonomous personal data management system in banking sector;Zainal MAG;Computers and electrical engineering,2022
2. A study on factors affecting service quality and loyalty intention in mobile banking;Zhou Q;Journal of Retailing and Consumer Services,2021
3. The role of shadow banking in systemic risk in the European financial system;Pellegrini CB;Journal of Banking & Finance,2022
4. Cybersecurity hazards and financial system vulnerability: a synthesis of literature;Uddin M;Risk Management,2020
5. Wodo, W., Blaskiewicz, P., Stygar, D., & Kuzma, N. (2021). Evaluating the security of electronic and mobile banking. Computer Fraud & Security, 2021(10), 8–14.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献