Designing a New Security Architecture for Online - Banking : A Hierarchical Intrusion Detection Architecture and Intrusion Detection System
نویسنده
چکیده
Nowadays internet has a key role in interaction between peoples and their businesses (such as banking). One of domain which uses this new communication channel for more and better interacts with its customers is online-banking (OB) industry. Using of OB is increasing rapidly. the significant growth in presenting and using of OB services such as responding to customers' requests on every time and every place and additive integration, leads to fast growth in fraud events and security problems. One of solutions against to security problems into this domain is using secure protocols. Also, it is possible to add new security layers like intrusion detection to the OB security infrastructure. The main purpose of this paper is recommending to using of IDS in OB industry. This paper presents a hierarchical Intrusion Detection Architecture (IDA: it is a hierarchical architecture, including two levels i.e. deploying HIDSs on users computers, OBIDS on the central server of banking services and an NIDS on the banking network), an architecture for the proposed Online-Banking Intrusion Detection System (OBIDS: applicable in format of software/hardware/hybrid systems) and locating the deployment location of these systems on OB security architecture. Thus, it is intended to improve the security of information exchange space by adding a new defensive-aggressive layer to the OB security infrastructure and then, providing more protection of banking information and transactions (especially on insecure space of internet and other public networks).
منابع مشابه
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملEntropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کامل