Return to search

Intelligent quality performance assessment for e-banking security using fuzzy logic

Yes / Security has been widely recognized as one of the
main obstacles to the adoption of Internet banking
and it is considered an important aspect in the
debate over challenges facing internet banking. The
performance evaluation of e-banking websites
requires a model that enables us to analyze the
various imperative factors and criteria related to the
quality and performance of e-banking websites. Ebanking
site evaluation is a complex and dynamic
problem involving many factors, and because of the
subjective considerations and the ambiguities
involved in the assessment, Fuzzy Logic (FL) model
can be an effective tool in assessing and evaluating
of e-banking security performance and quality. In
this paper, we propose an intelligent performance
assessment model for evaluating e-banking security
websites. The proposed model is based on FL
operators and produces four measures of security
risk attack dimensions: direct internal attack,
communication tampering attack, code programming
attack and denial of service attack with a
hierarchical ring layer structure. Our experimental
results show that direct internal attack risk has a
large impact on e-banking security performance. The
results also confirm that the risk of direct internal
attack for e-banking dynamic websites is doubled
that of all other attacks.

Identiferoai:union.ndltd.org:BRADFORD/oai:bradscholars.brad.ac.uk:10454/2493
Date January 2008
CreatorsAburrous, Maher R., Hossain, M. Alamgir, Thabatah, F., Dahal, Keshav P.
PublisherIEEE Computer Society Press.
Source SetsBradford Scholars
LanguageEnglish
Detected LanguageEnglish
TypeConference paper, Published version
RightsCopyright © [2008] IEEE. Reprinted from Fifth International Conference on Information Technology: New Generations (ITNG 2008). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bradford's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubspermissions@ ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it., Unspecified
Relationhttp://www2.computer.org/portal/web/csdl/doi/10.1109/ITNG.2008.154

Page generated in 0.0019 seconds