Defending Against Identity Threats Using Risk-Based Authentication
References
- Hassan, A., B. Nuseibeh, L. Pasquale. Engineering Adaptive Authentication. – In: Proc. of IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C’21), IEEE, 2021, pp. 275-280.
- Lal, N. A., S. Prasad, M. Farik. A Review of Authentication Methods. – International Journal of Scientific & Technology Research, Vol. 5, 2016, pp. 246-249.
- Bonneau, J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. – In: Proc. of IEEE Symposium on Security and Privacy, IEEE, 2012, pp. 538-552.
- Wang, D., Z. Zhang, P. Wang, J. Yan, X. Huang. Targeted Online Password Guessing: An Underestimated Threat. – In: Proc. of ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 1242-1254.
- Steinegger, R. H., D. Deckers, P. Giessler, S. Abeck. Risk-Basedauthenticator for Web Applications. – In: Proc. of 21st European Conference on Pattern Languages of Programs, 2016, pp. 1-11.
- Atlam, H. F., M. A. Azad, M. O. Alassafi, A. A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, p.103.
- Microsoft Digital Defence Report 2021. https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2021
- Wiefling, S., L. L. Iacono, M. Dürmuth. Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. – In: Proc. of IFIP International Conference on ICT Systems Security and Privacy Protection, Cham, Springer, 2019, pp. 134-148.
- Ashibani, Y., Q. H. Mahmoud. An Intelligent Risk-Based Authentication Approach for Smartphone Applications. – In: Proc. of IEEE International Conference on Systems, Man, and Cybernetics (SMC’20), IEEE, 2020, pp. 3807-3812.
- Phan, K. Implementing Resiliency of Adaptive Multi-Factor Authentication Systems. – Culminting Projects in Information Assurance, Vol. 65, 2018, p. 96.
- Wiefling, S., T. Patil, M. Dürmuth, L. L. Iacono. Evaluation of Risk-Based Re-Authentication Methods. – In: Proc. of IFIP International Conference on ICT Systems Security and Privacy Protection, Cham, Springer, 2020, pp. 280-294.
- Compromised Credentials Report. https://restech.solutions/wp-content/uploads/Dark-Web-Scan-Sample-Company.pdf
- Vistas – How Fast Is a Private Jet? https://www.vistajet.com/en/stories/fastest-private-jet/#:~:text=Most%20commercial%20aircraft%20typically%20fly,according%20to%20Flight%20Deck%20Friend.
- Microsoft Report Shows Increasing Sophistication of Cyber Threats. https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/
- Gartner Identifies Top Security and Risk Management Trends for 2021. https://www.gartner.com/en/newsroom/press-releases/2021-03-23-gartner-identifies-top-security-and-risk-management-t?s=09
- Vattikuti, S., M. R. Hegde, M. Manish, V. Bodduvaram, V. Sarasvathi. DDoS Attack Detection and Mitigation Using Anomaly Detection and Machine Learning Models. – In: Proc. of IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS’21), 2021, pp. 1-6.
- Kumar, P. R., P. H. Raj, P. Jelciana. Exploring Security Issues and Solutions in Cloud Computing Services – A Survey. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 3-31.
- Alosaimi, W., M. Zak, K. Al-Begain, R. Alroobaea, M. Masud. Mitigation of Distributed Denial of Service Attacks in the Cloud. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 32-51.
Language: English
Page range: 105 - 123
Submitted on: Dec 8, 2022
Accepted on: May 12, 2023
Published on: Jun 12, 2023
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year
Keywords:
Related subjects:
© 2023 Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
