International Journal of
Computer Engineering Research

  • Abbreviation: Int. J. Comput. Eng. Res.
  • Language: English
  • ISSN: 2141-6494
  • DOI: 10.5897/IJCER
  • Start Year: 2010
  • Published Articles: 33

Review

Security threats affecting user-data on transit in mobile banking applications: A review

Daniel Okari Orucho
  • Daniel Okari Orucho
  • School of Information Science and Technology, Kisii University, Kenya.
  • Google Scholar
Fredrick Mzee Awuor
  • Fredrick Mzee Awuor
  • School of Information Science and Technology, Kisii University, Kenya.
  • Google Scholar
Cyprian Ratemo
  • Cyprian Ratemo
  • School of Information Science and Technology, Kisii University, Kenya.
  • Google Scholar
Collins Oduor
  • Collins Oduor
  • School of Science and Technology, United States International University, Africa, Kenya.
  • Google Scholar


  •  Received: 28 January 2023
  •  Accepted: 29 August 2023
  •  Published: 30 September 2023

References

Abdullayev V, Chauhan AS (2023). SQL Injection Attack: Quick View. Mesopotamian Journal of Cybersecurity 2023:30-34
Crossref

 

Abuhamad M, Abusnaina A, Nyang DH, Mohaisen D (2020). Sensor Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet of Things Journal 8(1):65-84.
Crossref

 

Acharya S, Joshi S (2020). Impact of Cyber-attacks on Banking Institutions in India.A Study of Safety Mechanisms and Prevention Measures. Palarch's Journal of Archeology of Egypt 17(6):4656-4670.

 

Agrawal DP, Wang H (2018). Computer and Cyber Security. Auerbach Publications, New York. 

 

Alajanbi M, Ismail MA, Hasan RA, Sulaiman J (2021). Intrusion Detection: A Review, Mesopotamian Journal of Cyber Security 2021:1-4.
Crossref

 

Anu P, Vimala S (2017). A Survey of Sniffing Attacks on Computer Networks. International Conference on Intelligent Computing and (I2C2) pp. 1-5.
Crossref

 

Bagudu H, Khan S., Roslan A (2017). The Effect of Mobile Banking on the Performance of Commercial Banks in Nigeria. International Research Journal of Management, IT & Social Sciences 4(2):71-76.

 

Baklizi M, Atoum I, Hasan MAS, Abdullah N, Al-Wesabi OA, Otoom AA (2023). Prevention of Website SQL Injection Using a New Query Comparison and Encryption Algorithm. International Journal of Intelligent Systems and Applications in Engineering 11(1):228-238.

 

Bhattacharya I, Reddy PS (2022). Packet Sniffer. Journal of Engineering Sciences 13(6):204-211.

 

Bojjagani S, Sastry VN (2017). A Threat Model for Vulnerability Assessment and Penetration Testing for Android and Ios Mobile Banking Applications. 3rd International Conference on Collaborative and Internet Computing pp. 77-86. IEEE.
Crossref

 

Brandt M, Dai T, Klein A, Shulman H, Waidner M (2018). Domain Validation for Man in the Middle Resilient Public Key Infrastructure. In Proceedings of the 2018 Conference on Computer and Communications Security pp. 2060-2076

 

Camillo M (2017). Cybersecurity. Risks and Management of Risks for Global Banks and Financial Institutions. Journal of Risk Management in Financial Institutions 10(2):196-200.
Crossref

 

Chen HC, Nshimiyimana A, Damarjati C, Chang PH (2021). Detection and Prevention of Cross-Site Scripting attack with Combined Approaches. International Conference on Electronics, Information, and Communication pp. 1-4. IEEE
Crossref

 

Chou D, Jiang M (2021). A survey on data-driven network intrusion detection, ACM Computing Surveys 54(9):1-36.
Crossref

 

Costantino G, La Marra FA, Martinelli F, Matteucci I (2018). Candy. A Social Engineering Attack to Leak Information from Infotainment System. 87th Vehicular Technology Conference pp. 1-5.
Crossref

 

Crespo-Martínez IS, Campazas-Vega A, Guerrero-Higueras AM, Riego-DelCastillo V, Álvarez-Aparicio C, Fernández-Llamas C (2023). SQL injection attack detection in network flow data. Computers and Security 127:103093
Crossref

 

Digital Transformation Cyber Security News (2016). Tesco Bank Fined £16.4m after Hackers siphoned £2.26m from customers in 2016.

View

 

EMBASB (2022). European Mobile Banking Apps White Paper. 

 

Ghafir I (2016). Social Engineering Attack Atrategies and Defense Approaches. Proceedings of the IEEE International Conference on Future Internet of Things and Cloud pp. 145-149.
Crossref

 

Gupta S, Gupta BB (2016). XSS-SAFE: A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in JavaScript Code. Arabian Journal for Science and Engineering 41:897-920.
Crossref

 

Gupta BB, Gupta S, Chaudhary P (2017). Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing 7(1):1-31.
Crossref

 

Gupta S, Gupta BB (2018). XSS-Secure as a Service for the Platforms of Online Social Network-Based Multimedia Web Applications in Cloud. Multimedia Tools and Applications 77:4829-4861.
Crossref

 

Hadabi A, Elsamani E, Abdallah A, Elhabob R (2022). An Efficient Model to Detect and Prevent SQL Injection Attack, Journal of Karary University for Engineering and Science pp. 1-6.
Crossref

 

Hasham S, Joshi S, Mikkelsen D (2019). Financial crime and fraud in the age of cybersecurity. McKinsey & Company pp. 1-11.

 

Hossain MA, Ahmed F (2014). Evaluating the Impact of Mobile Banking Deployment for Microfinance. University of Dhaka Journal of Marketing 2012(15):144-157.

 

Hubballi N, Tripathi N (2017). A Closer Look into DHCP Starvation Attack in Wireless Networks. Computers & Security 65:387-404.
Crossref

 

Imagine IT (2023). The Rise of Mobile Malware.

View

 

Javeed D, Badamasi UM, Ndubuisi CO, Soomro F, Asif M (2020). Man in the Middle Attacks: Analysis, Motivation and Prevention. International Journal of Computer Networks and Computing Security 8(7):52-57.
Crossref

 

Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F (2020). Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security. IEEE Transactions on Sustainable Computing 5(2):204-212.
Crossref

 

Kaka S, Sastry VN, Maiti RR (2017). On the MitM Vulnerability in Mobile Banking Applications for Android Devices. International Conference on Advanced Networks and Telecommunications Systems pp. 1-6.
Crossref

 

Kaur G, Pande B, Bhardwaj A, Bhagat G, Gupta S (2018). Efficient yet Robust Elimination of XSS Attack Vectors from HTML5 Web Applications Hosted on OSN-Based Cloud Platforms. Procedia Computer Science 125:669-675.
Crossref

 

Khomich A (2022). Designing Mobile Banking Apps.

View

 

Kieseberg P, Fruhwirt P, Schrittwieser S, Weippl E (2015). Security Tests for Mobile Applications why using tls/ssl is not enough. 8th International Conference on Software Testing, Verification and Validation pp. 1-2.
Crossref

 

Kirsten S (2016). Cross Site Scripting (XSS) Software Attack.

View

 

Kumar M (2023). SQL Injection Attack on Database System. Wireless Communication Security pp. 183-198.
Crossref

 

Manhas S (2022). An Interpretive Saga of SQL Injection Attacks," in Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 1:3-12. Singapore: Springer Nature Singapore.
Crossref

 

Mastkar N, Isankar M, Sheikh FR, Singh D, Ramteka S (2018). Survey Paper on Securing Online Transaction using Cryptography and Steganography. International Journal of Scientific Research in Science, Engineering and Technology 4(4):463-465.

 

Mtaho AB (2015). Improving Mobile Money Security with Two-Factor Authentication. International Journal of Computer Application 109(7).
Crossref

 

Ndatinya V, Xiao Z (2015). Network Forensic Analysis using Wireshark, International Journal of Sensor Networks 10(2):97-106
Crossref

 

Nerwal B, Mohapatra AK, Usmani KA (2019). Towards a Taxonomy of Cyber Threats against Target Applications. Journal of Statistics and Management Systems 22(2):301-325.
Crossref

 

Okpara OS, Bekaroo G (2017). Fingerprint-Based Authentication in M-wallets using Embedded Cameras. IEEE International Conference on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe 1-5.
Crossref

 

Positive Technologies (2020). Vulnerabilities and Threats in Mobile Banking.

View

 

Raharja PSJ, Tresna R (2019). Adoption of Information and Communication Technology on Enhancing Business Performance. Study on Creative Industry SMEs in Bandung City, Indonesia. Review of Integrative Business and Economics Research 8(3):20-30.

 

Sahoo SR, Gupta BB (2019). Classification of Various Attacks and Their Defense Mechanism in Online Social Networks. A Survey. Enterprise Information Systems 13(6):832-864. 
Crossref

 

Salahdine F, Kaabouch N (2019). Social Engineering Attacks: A Survey. Future Internet 11(4):89.
Crossref

 

Sahin M, Ünlü T, Hébert C, Shepherd LA, Coull N, Mc Lean C (2022). Measuring developers' web security awareness from attack and defense perspectives. In 2022 IEEE Security and Privacy Workshops (SPW) pp. 31-43.
Crossref

 

Salim A, Sagheer AM, Yaseen L (2020). Design and Implementation of a Secure Mobile Banking System based on Elliptic Curve Integrated Encryption Schema Springer Nature Switzerland 1174:424-438 
Crossref

 

Sang NM (2021). Critical Factors affecting Consumer Intention of using Mobile Banking Applications During CCOVID-19 Pandemic: An Empirical Study from Vietnam Journal of Asian Finance, Economics and Business 8(11):157-167.

 

Shachi M, Shourav NS, Ahmed ASS, Brishty AA, Sakib NA (2021). Survey on Detection and Prevention of SQL and NoSQL Injection Attack on Server-side Applications. International Journal of Computer Applications 183(10):1-7.
Crossref

 

Stevens C (2020). Assembling Cybersecurity: The politics and materiality of Technical Malware Reports and the Case of Stuxnet. Contemporary Security Policy 41(1):129-152.
Crossref

 

Tran HTT, Corner J (2016). The impact of communication channels on mobile banking adoption. International Journal of Bank Marketing 34(1):78-109.
Crossref

 

Tripathi N, Hubballi N (2021). Application Layer Denial-of-Service (DoS) Attacks and Defense Mechanisms: A Survey. Association for Computing Machinery 1(1):1-33.
Crossref

 

Usman K, Obilikwu P, Patrick K, Karim R (2019). Securing Data on Transmission From Man-In-The-Middle Attacks using Diffie Hell-man Key Exchange Encryption Mechanism. International Journal of Engineering and Science 8(8):88-94.

 

Xu G, Xie X, Huang S, Zhang J, Pan L, Lou W (2020). A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Transactions on Dependable and Secure Computing 19(2):826-878.
Crossref

 

Yadav N, Shekokar NM (2023). SQL Injection Attacks on Indian Websites: A Case Study, in Cyber Security Threats and Challenges Facing Human Life: Chapman and Hall/CRC pp. 153-170.
Crossref

 

Yildirim N, Varol A (2019). A research on Security Vulnerabilities in Online and Mobile Banking Systems. 7th International Symposium on Digital Forensics and Security pp. 1-5.
Crossref

 

Zhu L, Hu Z, Heidemann J, Wessels D, Mankin A, Somaiya N (2015). Connection-Oriented DNS to Improve Privacy and Security. IEEE Symposium on Security and Privacy pp. 171-186.
Crossref