A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack

A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack

Rajat Kumar Behera (KIIT University, Bhubaneswar, India), Abhaya Kumar Sahoo (KIIT University, Bhubaneswar, India) and Ajay Jena (KIIT University, Bhubaneswar, India)
Copyright: © 2017 |Pages: 25
DOI: 10.4018/IJOSSP.2017070102
OnDemand PDF Download:
No Current Special Offers


This article describes how electronic payments are financial transactions made over the internet for goods or services. In the digital era, the e-commerce industry has gone beyond the traditional in-store service due to the wide spread of internet-based shopping. Developed countries are greatly relying on e-commerce business and a sizable number of countries have shown concern in regard to the online payment cards such as credit cards, debit cards, e-cash, e-cheques, e-wallets and smart card security. The main downsides are concerns over privacy or a malicious attack and hence safeguard mechanisms are required to protect personal information from falling into the hands of intruders. Before commercializing electronic payment systems (EPS), security tests play a significant role in the software development life cycle to check whether the system is secure and it is safe to use. A resourceful approach covering security policies, secure coding, security attack prevention methodology, security testing tool, security testing metrics, security test case prioritization techniques and a model for effective project management methodology are presented in this article. Early detection and resolution of security weaknesses can be achieved with the authors' proposed approach and would certainly reduce the time, effort and cost of a project. The proposed approach is likely the best-fit implementation of the payment industry, covering channels like B2C (Business to Consumer), C2C (Consumer to Consumer), C2B (Consumer to Business), B2B (Business to Business), People to People (P2P), G2C (Government to Citizen) and C2G (Citizen to Government).
Article Preview


In current scenario, security of the online payment website is very important because activities like online banking, utility bill payment and e-commerce etc. are made through the internet, which demands security. Singh et al. (2014) past history like Citigroup, Sony, ADP (Automatic Data Processing) and others suffered from major breaches in the year 2012 and in the recent times, security has taken a major role.

The most common types of attacks that a malicious user can use to exploit EPS security are: SQL injection attack (SQLI), XSS (Cross Site Scripting) attack, URL manipulation, Brute Force attack (BF), Denial of Service (DoS)/Distributed Denial of Service (DDoS), Identity Spoofing, Malware, Malvertising, Session hijacking (SH), etc.

Laverty et al. (2009) standard network security practices attempt to avert unauthorized access to network resources or interrupt the content of network messages before a destructive user has the option to do any potential damage. Still, easy accessibility of internet has led to increase in new web security attack. MacDonald et al. (2009) Intrusion-detection systems and firewalls do not defend web based system from SQL injection attack and Cross Site Scripting. WASC (2005) as per Web Application Security Consortium, XSS, SQLI and DoS are the most frequently attacked the web application. As per 2016 statistics, % wise attack is presented in Table 1 (cyber attack statistics, 2017).

Table 1.
Percentage wise attack on EPS
Sr#Attack TypeAttack Percentage
2Account Hacking15.1
3Targeted Attack11.6

Complete Article List

Search this Journal:
Open Access Articles
Volume 13: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 12: 4 Issues (2021): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 1 Issue (2015)
Volume 5: 3 Issues (2014)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing