Back to Search Start Over

A Biometrics-Based Solution to Combat SIM Swap Fraud

Authors :
Basie von Solms
Louis Jordaan
University of Johannesburg (UJ)
Jan Camenisch
Valentin Kisimov
Maria Dubovitskaya
TC 11
WG 11.4
Source :
Lecture Notes in Computer Science, 1st Open Research Problems in Network Security (iNetSec), 1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩, Lecture Notes in Computer Science ISBN: 9783642192272, iNetSec
Publication Year :
2010
Publisher :
HAL CCSD, 2010.

Abstract

Part 2: Adversaries; International audience; Cybercriminals are constantly prowling the depths of cyberspace in search of victims to attack. The motives for their attacks vary: some cybercriminals deface government websites to make political statements; others spread malicious software to do large-scale harm; and others still are monetary motivated. In this paper we will concentrate on “cyber fraudsters”. At the time of this writing, a prime hunting ground for fraudsters is online banking. Millions of people worldwide use online banking to quickly and conveniently do their regular bank-related transactions. Unfortunately, this convenience comes at a price. By doing their banking online, they are vulnerable to falling prey to fraud scams such as SIM swap fraud. This paper explains what SIM swap fraud is and how it works. We will analyze the online banking payment transaction process to discover what vulnerabilities fraudsters exploit via SIM swap fraud, and then introduce a computer-based security system which has been developed to help combat it.

Details

Language :
English
ISBN :
978-3-642-19227-2
ISBNs :
9783642192272
Database :
OpenAIRE
Journal :
Lecture Notes in Computer Science, 1st Open Research Problems in Network Security (iNetSec), 1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩, Lecture Notes in Computer Science ISBN: 9783642192272, iNetSec
Accession number :
edsair.doi.dedup.....6c09416f300b96b7cad23510b6e53f8f
Full Text :
https://doi.org/10.1007/978-3-642-19228-9_7⟩