{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:10:27Z","timestamp":1743030627508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587024"},{"type":"electronic","value":"9783030587031"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_12","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"193-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer"],"prefix":"10.1007","author":[{"given":"Yasser","family":"Karim","sequence":"first","affiliation":[]},{"given":"Ragib","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"12_CR1","unstructured":"Ach Volume Grows. \nhttps:\/\/www.nacha.org\/news\/ach-volume-grows-56-percent-adding-13-billion-payments-2015-0"},{"key":"12_CR2","unstructured":"Ach vs Wire vs Electronic Transfer? What is the difference?. \nhttps:\/\/moneyrep.iaacu.org\/2014\/05\/ach-vs-wire-vs-electronic-transfer-what-is-the-difference\/"},{"key":"12_CR3","unstructured":"Citibank Credit Card Data Breach. \nhttps:\/\/www.thedailybeast.com\/citi-credit-card-leak-nearly-twice-as-big"},{"key":"12_CR4","unstructured":"Clearing House Interbank Payments System. \nhttps:\/\/en.wikipedia.org\/wiki\/Clearing_House_Interbank_Payments_System"},{"key":"12_CR5","unstructured":"Cyber Security Cost of JPMorgan Chase. \nhttp:\/\/www.bankrate.com\/finance\/banking\/us-data-breaches-1.aspx#slide=5"},{"key":"12_CR6","unstructured":"Fedwire Funds Services. \nhttps:\/\/www.federalreserve.gov\/paymentsystems\/fedfunds_about.htm"},{"key":"12_CR7","unstructured":"Hacker Bugging the System of Bangladesh Bank. \nhttps:\/\/web.archive.org\/web\/20160312145208\/http:\/\/www.asianews.network\/content\/hackers-bugged-bangladesh-bank-system-jan-11271"},{"key":"12_CR8","unstructured":"How a Simple Typo Helped Stop a 1 Billion Dollar Digital Bank Heist - The Washington Post. \nhttps:\/\/goo.gl\/Fm5NRa"},{"key":"12_CR9","unstructured":"Paypal. \nhttps:\/\/en.wikipedia.org\/wiki\/PayPal"},{"key":"12_CR10","unstructured":"RCBC had to Pay 1 Billion Filipino Dollar as Penalty. \nhttps:\/\/manilastandard.net\/business\/213132\/rcbc-pays-half-of-p1-b-penalty.html"},{"key":"12_CR11","unstructured":"Rupay Credit Card Data Breach. \nhttp:\/\/www.reuters.com\/article\/us-india-banks-fraud\/security-breach-feared-in-up-to-3-25-million-indian-debit-cards-idUSKCN12K0CC?il=0"},{"key":"12_CR12","unstructured":"Bangladesh Bank Heist (2015). \nhttps:\/\/en.wikipedia.org\/wiki\/Bangladesh_Bank_heist"},{"key":"12_CR13","unstructured":"Brazilian Bank Hack (2015). \nhttps:\/\/www.wired.com\/2017\/04\/hackers-hijacked-banks-entire-online-operation\/"},{"key":"12_CR14","unstructured":"Ecuador Bank Heist (2015). \nhttp:\/\/www.reuters.com\/article\/us-wells-fargo-banco-del-austro-ruling-idUSKCN12J03J"},{"key":"12_CR15","unstructured":"Fin-What is Swift (2015). \nhttps:\/\/fin.plaid.com\/articles\/what-is-swift"},{"key":"12_CR16","unstructured":"Hetachi Heist (2015). \nhttps:\/\/timesofindia.indiatimes.com\/business\/india-business\/hitachi-payment-accepts-malware-hit\/articleshow\/57071322.cms"},{"key":"12_CR17","unstructured":"JP Morgan Bank Heist (2015). \nhttp:\/\/www.businessinsider.com\/jpmorgan-hacked-bank-breach-2015-11"},{"key":"12_CR18","unstructured":"Lyod Bank Hack (2015). \nhttp:\/\/www.theinquirer.net\/inquirer\/news\/3003091\/lloyds-bank-hack-ddos-attack-disrupts-banks-online-services"},{"key":"12_CR19","unstructured":"Russian Bank DDoS Attack (2015). \nhttps:\/\/www.theregister.co.uk\/2016\/11\/11\/russian_banks_ddos\/"},{"key":"12_CR20","unstructured":"Tesco Bank Heist (2015). \nhttp:\/\/thehackernews.com\/2016\/11\/tesco-bank-hack.html"},{"key":"12_CR21","unstructured":"Ukraine Bank Swift Hack (2015). \nhttp:\/\/thehackernews.com\/2016\/06\/ukrainian-bank-swift-hack.html"},{"key":"12_CR22","unstructured":"US Bank DDoS Attack (2015). \nhttp:\/\/www.nytimes.com\/2012\/10\/01\/business\/cyberattacks-on-6-american-banks-frustrate-customers.html"},{"key":"12_CR23","unstructured":"Vietnam Bank Swift Hack (2015). \nhttp:\/\/www.reuters.com\/article\/us-vietnam-cybercrime-idUSKCN0Y60EN"},{"issue":"3","key":"12_CR24","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s12559-010-9042-7","volume":"2","author":"M Aburrous","year":"2010","unstructured":"Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Experimental case studies for investigating e-banking phishing techniques and attack strategies. Cogn. Comput. 2(3), 242\u2013253 (2010)","journal-title":"Cogn. Comput."},{"issue":"4","key":"12_CR25","first-page":"268","volume":"1","author":"MKA Ahmad","year":"2010","unstructured":"Ahmad, M.K.A., Rosalim, R.V., Beng, L.Y., Fun, T.S.: Security issues on banking systems. Int. J. Comput. Sci. Inf. Technol. 1(4), 268\u2013272 (2010)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Alazab, M., Venkatraman, S., Watters, P., Alazab, M., Alazab, A.: Cybercrime: the case of obfuscated malware. In: Global Security, Safety and Sustainability & e-Democracy, pp. 204\u2013211. Springer (2012)","DOI":"10.1007\/978-3-642-33448-1_28"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Chachra, N., Savage, S., Voelker, G.M.: Affiliate crookies: characterizing affiliate marketing abuse. In: Proceedings of the 2015 ACM Conference on Internet Measurement Conference, pp. 41\u201347. ACM (2015)","DOI":"10.1145\/2815675.2815720"},{"issue":"3","key":"12_CR28","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/S0167-4048(02)00312-7","volume":"21","author":"J Claessens","year":"2002","unstructured":"Claessens, J., Dem, V., De Cock, D., Preneel, B., Vandewalle, J.: On the security of today\u2019s online banking systems. Comput. Secur. 21(3), 253\u2013265 (2002)","journal-title":"Comput. Secur."},{"key":"12_CR29","unstructured":"FBI: Bank Crime Statistics (2015). \nhttps:\/\/www.fbi.gov\/investigate\/violent-crime\/bank-robbery\/bank-crime-reports"},{"key":"12_CR30","first-page":"1","volume":"2009","author":"T Holz","year":"2009","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. Comput. Secur.-ESORICS 2009, 1\u201318 (2009)","journal-title":"Comput. Secur.-ESORICS"},{"issue":"1","key":"12_CR31","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.mcm.2012.07.019","volume":"58","author":"JH Lee","year":"2013","unstructured":"Lee, J.H., Lim, W.G., Lim, J.I.: A study of the security of Internet banking and financial private information in South Korea. Math. Comput. Model. 58(1), 117\u2013131 (2013)","journal-title":"Math. Comput. Model."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Li, W., Chen, H.: Identifying top sellers in underground economy using deep learning-based sentiment analysis. In: 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), pp. 64\u201367. IEEE (2014)","DOI":"10.1109\/JISIC.2014.19"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Mannan, M., van Oorschot, P.C.: Security and usability: the gap in real-world online banking. In: Proceedings of the 2007 Workshop on New Security Paradigms, pp. 1\u201314. ACM (2008)","DOI":"10.1145\/1600176.1600178"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: An analysis of underground forums. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 71\u201380. ACM (2011)","DOI":"10.1145\/2068816.2068824"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Oro, D., Luna, J., Felguera, T., Vilanova, M., Serna, J.: Benchmarking IP blacklists for financial botnet detection. In: 2010 Sixth International Conference on Information Assurance and Security (IAS), pp. 62\u201367. IEEE (2010)","DOI":"10.1109\/ISIAS.2010.5604040"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Pearce, P., Dave, V., Grier, C., Levchenko, K., Guha, S., McCoy, D., Paxson, V., Savage, S., Voelker, G.M.: Characterizing large-scale click fraud in ZeroAccess. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 141\u2013152. ACM (2014)","DOI":"10.1145\/2660267.2660369"},{"key":"12_CR37","unstructured":"Riccardi, M., Oro, D., Luna, J., Cremonini, M., Vilanova, M.: A framework for financial botnet analysis. In: ECrime Researchers Summit (ECrime), 2010, pp. 1\u20137. IEEE (2010)"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Tajalizadehkhoob, S., Ga\u00f1\u00e1n, C., Noroozian, A., Eeten, M.V.: The role of hosting providers in fighting command and control infrastructure of financial malware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 575\u2013586. ACM (2017)","DOI":"10.1145\/3052973.3053023"},{"key":"12_CR39","unstructured":"Tajalizadehkhoob, S., Asghari, H., Ga\u00f1\u00e1n, C., van Eeten, M.: Why them? Extracting intelligence about target selection from Zeus financial malware. In: WEIS (2014)"},{"key":"12_CR40","unstructured":"Financial Crimes Enforcement Network of Department of the Treasury (2015). \nhttps:\/\/www.fincen.gov\/reports\/sar-stats"},{"issue":"11","key":"12_CR41","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1016\/S0166-4972(03)00130-5","volume":"23","author":"SY Yousafzai","year":"2003","unstructured":"Yousafzai, S.Y., Pallister, J.G., Foxall, G.R.: A proposed model of e-trust for electronic banking. Technovation 23(11), 847\u2013860 (2003)","journal-title":"Technovation"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"issue":"1","key":"12_CR43","first-page":"15","volume":"3","author":"D Zhu","year":"2002","unstructured":"Zhu, D.: Security control in inter-bank fund transfer. J. Electron. Commer. Res. 3(1), 15\u201322 (2002)","journal-title":"J. Electron. Commer. Res."}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:08:55Z","timestamp":1599545335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}