Design of a Risk Based Authentication System using Machine Learning Techniques

被引:0
|
作者
Misbahuddin, Mohammed [1 ]
Bindhumadhava, B. S. [1 ]
Dheeptha, B. [2 ]
机构
[1] Ctr Dev Adv Comp, Comp Networks & Internet Engn CNIE Div, Bangalore 560100, Karnataka, India
[2] Sastra Univ, Dept Comp Sci & Engn, Thanjavur 613402, Tamil Nadu, India
关键词
Multi-factor Authentication; Risk Based Authentication; User behavior; Risk engine; Machine Learning Algorithms;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication provides a means to verify the legitimacy of a user trying to access any confidential or sensitive information. The need for protecting secure data hosted on the web has been rising exponentially as organizations are moving their applications online. Static methods of authentication cannot completely guarantee the genuineness of a user. This has led to the development of multi-factor authentication systems. Risk based authentication, a form of multi factor authentication adapts itself according to the risk profile of the users. This paper puts forth the design of risk engine integrated with the system to examine the user's past login records and generate a suitable pattern using machine learning algorithms to calculate the risk level of the user. The risk level further decides the authentication method that the user will be challenged with. Thus the adaptive authentication model helps in providing a higher level of security to its users.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [41] Risk Prediction of Diabetic Disease Using Machine Learning Techniques
    Tamanna
    Kumari, Ritika
    Bansal, Poonam
    Dev, Amita
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 1, SMARTCOM 2024, 2024, 945 : 197 - 209
  • [42] Statement-Level Timing Estimation for Embedded System Design Using Machine Learning Techniques
    Muttillo, Vittoriano
    Giammatteo, Paolo
    Stoico, Vincenzo
    PROCEEDINGS OF THE ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '21), 2021, : 257 - 264
  • [43] Network-based Classification of Authentication Attempts using Machine Learning
    Taylor, Curtis R.
    Lanson, Julian P.
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 669 - 673
  • [44] An IoT based authentication system for therapeutic herbs measured by local descriptors using machine learning approach
    Roopashree, S.
    Anitha, J.
    Mahesh, T. R.
    Kumar, V. Vinoth
    Viriyasitavat, Wattana
    Kaur, Amandeep
    MEASUREMENT, 2022, 200
  • [45] IoT-Based Smart Inventory Management System Using Machine Learning Techniques
    Manoharan, Geetha
    Kumar, Vipin
    Karthik, A.
    Asha, V
    Mohan, Chinnem Rama
    Nijhawan, Ginni
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [46] Authentication of Underwater Acoustic Transmissions via Machine Learning Techniques
    Bragagnolo, L.
    Ardizzon, F.
    Laurenti, N.
    Casari, P.
    Diamant, R.
    Tomasin, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, ANTENNAS, COMMUNICATIONS AND ELECTRONIC SYSTEMS (COMCAS), 2021, : 255 - 260
  • [47] Permission-Based Malware Detection System for Android Using Machine Learning Techniques
    Arslan, Recep Sinan
    Dogru, Ibrahim Alper
    Barisci, Necaattin
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (01) : 43 - 61
  • [48] Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1506 - 1521
  • [49] Research and Design of Credit Risk Assessment System Based on Big Data and Machine Learning
    Wen, Song
    Zeng, Bi
    Liao, Wenxiong
    Wei, Pengfei
    Pan, Zhihao
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2021), 2021, : 9 - 13
  • [50] Teachable machine : A web based machine learning tool for user voice biometric authentication system
    Chhipa, Vinod
    Poonia, Rakesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1345 - 1355