Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber cri...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ikatan Ahli Informatika Indonesia
2023-08-01
|
Series: | Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) |
Subjects: | |
Online Access: | http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025 |
_version_ | 1797330448816275456 |
---|---|
author | Aldiansah Prayogi Rizal Fathoni Aji |
author_facet | Aldiansah Prayogi Rizal Fathoni Aji |
author_sort | Aldiansah Prayogi |
collection | DOAJ |
description | The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover. |
first_indexed | 2024-03-08T07:19:59Z |
format | Article |
id | doaj.art-06470978cbc24e4bac2ce941c6195c08 |
institution | Directory Open Access Journal |
issn | 2580-0760 |
language | English |
last_indexed | 2024-03-08T07:19:59Z |
publishDate | 2023-08-01 |
publisher | Ikatan Ahli Informatika Indonesia |
record_format | Article |
series | Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) |
spelling | doaj.art-06470978cbc24e4bac2ce941c6195c082024-02-02T23:44:04ZengIkatan Ahli Informatika IndonesiaJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)2580-07602023-08-017479780810.29207/resti.v7i4.50255025Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account TakeoverAldiansah Prayogi0Rizal Fathoni Aji1Universitas IndonesiaUniversitas IndonesiaThe Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover.http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025sms otp vulnerabilitymobile network verificationheader enrichmentaccount takeover prevention |
spellingShingle | Aldiansah Prayogi Rizal Fathoni Aji Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) sms otp vulnerability mobile network verification header enrichment account takeover prevention |
title | Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover |
title_full | Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover |
title_fullStr | Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover |
title_full_unstemmed | Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover |
title_short | Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover |
title_sort | utilization of mobile network infrastructure to prevent financial mobile application account takeover |
topic | sms otp vulnerability mobile network verification header enrichment account takeover prevention |
url | http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025 |
work_keys_str_mv | AT aldiansahprayogi utilizationofmobilenetworkinfrastructuretopreventfinancialmobileapplicationaccounttakeover AT rizalfathoniaji utilizationofmobilenetworkinfrastructuretopreventfinancialmobileapplicationaccounttakeover |