Securing Remote Access to Information Systems of Critical Infrastructure Using Two-Factor Authentication

被引:6
|
作者
Bruzgiene, Rasa [1 ]
Jurgilas, Konstantinas [1 ]
机构
[1] Kaunas Univ Technol, Dept Comp Sci, Studentu Str 50-211, LT-51368 Kaunas, Lithuania
关键词
2FA authentication; critical infrastructure; penetration testing; vulnerability; cyber-attack;
D O I
10.3390/electronics10151819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system's user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method's usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system's endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351
  • [2] Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication
    Gualdoni, Joseph
    Kurtz, Andrew
    Myzyri, Ilva
    Wheeler, Megan
    Rizvi, Syed
    [J]. COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 93 - 99
  • [3] Two-factor remote authentication protocol and BAN Analysis
    Zhang, Lihua
    Bai, Erfei
    [J]. 2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 411 - 414
  • [4] SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals
    Liu, Dan
    Wang, Qian
    Zhou, Man
    Jiang, Peipei
    Li, Qi
    Shen, Chao
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1687 - 1701
  • [5] A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem
    Soni, Preeti
    Ali, Rifaqat
    Pal, Arup Kumar
    [J]. IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [6] Applying the MCMSI for Online Educational Systems Using the Two-Factor Authentication
    Ahmed, Shaymaa Taha
    Kadhim, Qusay Kanaan
    Mahdi, Hamid Sadeq
    Almahdy, Widyan Salman Abd
    [J]. Ahmed, Shaymaa Taha (Shaymaa.taha.ahmed@basicedu.uodiyala.edu); Kadhim, Qusay Kanaan (qusaykn@bauc14.edu.iq); Mahdi, Hamid Sadeq (hamedsultani@uodiyala.edu.iq); Almahdy, Widyan Salman Abd (drasatolia2020@gmail.com), 1600, International Association of Online Engineering (15): : 162 - 171
  • [7] Enabling Secure Vehicle to Infrastructure Communication via Two-Factor Authentication
    Dwyer, Ben
    Sarma, Sanjay E.
    Suo, Dajiang
    [J]. 2023 IEEE 26TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, ITSC, 2023, : 5663 - 5668
  • [8] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    [J]. Journal of Medical Systems, 2015, 39
  • [9] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [10] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    [J]. INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512