Have a personal or library account? Click to login
Defending Against Identity Threats Using Risk-Based Authentication Cover

Defending Against Identity Threats Using Risk-Based Authentication

Open Access
|Jun 2023

References

  1. Hassan, A., B. Nuseibeh, L. Pasquale. Engineering Adaptive Authentication. – In: Proc. of IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C’21), IEEE, 2021, pp. 275-280.
  2. Lal, N. A., S. Prasad, M. Farik. A Review of Authentication Methods. – International Journal of Scientific & Technology Research, Vol. 5, 2016, pp. 246-249.
  3. Bonneau, J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. – In: Proc. of IEEE Symposium on Security and Privacy, IEEE, 2012, pp. 538-552.
  4. Wang, D., Z. Zhang, P. Wang, J. Yan, X. Huang. Targeted Online Password Guessing: An Underestimated Threat. – In: Proc. of ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 1242-1254.
  5. Steinegger, R. H., D. Deckers, P. Giessler, S. Abeck. Risk-Basedauthenticator for Web Applications. – In: Proc. of 21st European Conference on Pattern Languages of Programs, 2016, pp. 1-11.
  6. Atlam, H. F., M. A. Azad, M. O. Alassafi, A. A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, p.103.
  7. Microsoft Digital Defence Report 2021. https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2021
  8. Wiefling, S., L. L. Iacono, M. Dürmuth. Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. – In: Proc. of IFIP International Conference on ICT Systems Security and Privacy Protection, Cham, Springer, 2019, pp. 134-148.
  9. Ashibani, Y., Q. H. Mahmoud. An Intelligent Risk-Based Authentication Approach for Smartphone Applications. – In: Proc. of IEEE International Conference on Systems, Man, and Cybernetics (SMC’20), IEEE, 2020, pp. 3807-3812.
  10. Phan, K. Implementing Resiliency of Adaptive Multi-Factor Authentication Systems. – Culminting Projects in Information Assurance, Vol. 65, 2018, p. 96.
  11. Wiefling, S., T. Patil, M. Dürmuth, L. L. Iacono. Evaluation of Risk-Based Re-Authentication Methods. – In: Proc. of IFIP International Conference on ICT Systems Security and Privacy Protection, Cham, Springer, 2020, pp. 280-294.
  12. Compromised Credentials Report. https://restech.solutions/wp-content/uploads/Dark-Web-Scan-Sample-Company.pdf
  13. Vistas – How Fast Is a Private Jet? https://www.vistajet.com/en/stories/fastest-private-jet/#:~:text=Most%20commercial%20aircraft%20typically%20fly,according%20to%20Flight%20Deck%20Friend.
  14. Microsoft Report Shows Increasing Sophistication of Cyber Threats. https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/
  15. Gartner Identifies Top Security and Risk Management Trends for 2021. https://www.gartner.com/en/newsroom/press-releases/2021-03-23-gartner-identifies-top-security-and-risk-management-t?s=09
  16. Vattikuti, S., M. R. Hegde, M. Manish, V. Bodduvaram, V. Sarasvathi. DDoS Attack Detection and Mitigation Using Anomaly Detection and Machine Learning Models. – In: Proc. of IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS’21), 2021, pp. 1-6.
  17. Kumar, P. R., P. H. Raj, P. Jelciana. Exploring Security Issues and Solutions in Cloud Computing Services – A Survey. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 3-31.
  18. Alosaimi, W., M. Zak, K. Al-Begain, R. Alroobaea, M. Masud. Mitigation of Distributed Denial of Service Attacks in the Cloud. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 32-51.
DOI: https://doi.org/10.2478/cait-2023-0016 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 105 - 123
Submitted on: Dec 8, 2022
Accepted on: May 12, 2023
Published on: Jun 12, 2023
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2023 Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.