Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen: http://dx.doi.org/10.25673/86234
Langanzeige der Metadaten
DC ElementWertSprache
dc.contributor.authorEzennaya-Gomez, Salatiel-
dc.contributor.authorKiltz, Stefan-
dc.contributor.authorKrätzer, Christian-
dc.contributor.authorDittmann, Jana-
dc.date.accessioned2022-06-16T11:40:35Z-
dc.date.available2022-06-16T11:40:35Z-
dc.date.issued2021-
dc.date.submitted2021-
dc.identifier.urihttps://opendata.uni-halle.de//handle/1981185920/88186-
dc.identifier.urihttp://dx.doi.org/10.25673/86234-
dc.description.abstractThe paper discusses means to identify potential impacts of data flows on customers’ security, and privacy during online payments. The main objectives of our research are looking into the evolution of cybercrime new trends of online payments and detection, more precisely the usage of mobile phones, and describing methodologies for digital trace identification in data flows for potential online payment fraud. The paper aims to identify potential actions for identity theft while conducting the Reconnaissance step of the kill chain, and documenting a forensic methodology for guidance and further data collection for law enforcement bodies. Moreover, a secondary objective of the paper is to identify, from a user’s perspective, transparency issues of data sharing among involved parties for online payments. We thus declare the transparency analysis as the incident triggering a forensic examination. Hence, we devise a semi-automated traffic analysis approach, based on previous work, to examine data flows, and data exchanged among parties in online payments. For this, the main steps are segmenting traffic generated by the process payment, and other sources, subsequently, identifying data streams in the process. We conduct three tests which include three different payment gateways: PayPal, Klarna-sofort, and Amazon Pay. The experiment setup requires circumventing TLS encryption for the correct identification of forensic data types in TCP/IP traffic, and potential data leaks. However, it requires no extensive expertise in mobile security for its installation. In the results, we identified some important security vulnerabilities from some payment APIs that pose financial and privacy risks to the marketplace’s customers.eng
dc.description.sponsorshipTransformationsvertrag-
dc.language.isoeng-
dc.relation.ispartofhttps://dl.acm.org/doi/proceedings/10.1145/3465481-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.subjectApplied computingeng
dc.subjectEvidence collectioneng
dc.subjectStorage and analysiseng
dc.subjectSecurity and privacyeng
dc.subjectEconomics of security and privacyeng
dc.subject.ddc000-
dc.titleA semi-automated HTTP traffic analysis for online payments for empowering security, forensics and privacy analysiseng
dc.typeConference Object-
dc.identifier.urnurn:nbn:de:gbv:ma9:1-1981185920-881860-
local.versionTypepublishedVersion-
local.openaccesstrue-
dc.identifier.ppn1767713401-
local.bibliographicCitation.year2021-
cbs.sru.importDate2022-06-16T11:37:07Z-
local.bibliographicCitationEnthalten in ARES 2021 - New York, New York : The Association for Computing Machinery, 2021-
local.accessrights.dnbfree-
Enthalten in den Sammlungen:Fakultät für Informatik (OA)

Dateien zu dieser Ressource:
Datei Beschreibung GrößeFormat 
Ezennaya-Gomez et al._A semi-automated_2021.pdfZweitveröffentlichung1.52 MBAdobe PDFMiniaturbild
Öffnen/Anzeigen