Risk-Based Authentication using Autoencoders
Bharat Sharma1 , Sidharth Singh2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-7 , Page no. 155-160, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.155160
Online published on Jul 31, 2019
Copyright © Bharat Sharma, Sidharth Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Bharat Sharma, Sidharth Singh, “Risk-Based Authentication using Autoencoders,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.155-160, 2019.
MLA Style Citation: Bharat Sharma, Sidharth Singh "Risk-Based Authentication using Autoencoders." International Journal of Computer Sciences and Engineering 7.7 (2019): 155-160.
APA Style Citation: Bharat Sharma, Sidharth Singh, (2019). Risk-Based Authentication using Autoencoders. International Journal of Computer Sciences and Engineering, 7(7), 155-160.
BibTex Style Citation:
@article{Sharma_2019,
author = {Bharat Sharma, Sidharth Singh},
title = {Risk-Based Authentication using Autoencoders},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {155-160},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4737},
doi = {https://doi.org/10.26438/ijcse/v7i7.155160}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.155160}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4737
TI - Risk-Based Authentication using Autoencoders
T2 - International Journal of Computer Sciences and Engineering
AU - Bharat Sharma, Sidharth Singh
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 155-160
IS - 7
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1132 | 381 downloads | 185 downloads |
Abstract
Verification gives a way to check the authenticity of a client attempting to get to any classified or delicate data. The requirement for ensuring secure information facilitated on the web has been rising exponentially as associations are moving their applications on the web. Static techniques for validation can`t totally ensure the validity of a client. This has prompted the advancement of multifaceted validation frameworks. Risk-based validation; a type of multifaceted verification adjusts as per the risk profile of the clients. This paper advances the plan of risk motor incorporated with the framework to inspect the client`s past login records and produce an appropriate example utilizing AI calculations to figure the risk dimension of the client. The risk level further chooses the confirmation technique that the client will be tested with. In this manner the versatile verification model aides in giving a more elevated amount of security to its clients.
Key-Words / Index Term
User Metadata, Risk Metadata, Authentication System
References
[1] Kumar Abhishek, SahanaRoshan, Prabhat Kumar and Rajeev Ranjan. "A comprehensive study on Multifactor Authentication Schemes". Advances in Computing and Information Technology, 177, pp. 561-568,2013.
[2] Tubin G (2005) Emergence of risk-based authentication in online financial services: You Can’t Hide Your Lyin’ IP. Whitepaper #V43:15N, Tower Group, May
[3] Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools Appl 57(1):49–66
[4] Orozco M, Graydon M, Shirmohammadi S, El Saddik A (2012) Experiments in haptic-based authentication of humans, International Journal of Multimedia Tools and Applications - Springer Science + Business Media B.V.
[5] Issa Traore & Isaac Woungang & Mohammad S. Obaidat & Youssef Nakkabi & Iris La in Springer Science+Business Media New York 2013 DOI 10.1007/s11042-013-1518-5
[6] Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In Proc. of the 3rd Annual Conference on Trust Management (iTrust’05),
[7] Mohan V. Pawar, Anuradha J. " Network Security and Types of Attacks in Network". Procedia Computer Science 48, pp. 503 – 506,2015.
[8] Oded Peer, Yedidya Dotan, Yael Villa and Marcelo Blatt. "USING BASELINE PROFILES IN ADAPTIVE AUTHENTICATION". US Patent 8,621,586 B1, December 31,2013.
[9] Misbahuddin, Dr Mohammed & Premchand, P & Govardhan, Dr. (2008). A user-friendly password authenticated key agreement For web based services. 10.1109/INNOVATIONS.2008.4781766.
[10] Environment", in International Conference on Advances in Computing, Communication and Control (ICAC3’09)
[11] DipankarDasgupta, Arunava Roy and Abhijit Nag. "Toward the design of adaptive selection strategies for multi-factor authentication". computers& security, pp. 85–116,2016.