Designing a Framework for AI-Based User Authentication System through Behaviour Monitoring
Keywords:
Cybersecurity, assets, behaviour, authenticated, testedAbstract
In the ever-changing cybersecurity landscape, Behavior Identification has emerged as an essential aspect of protecting any digital assets. In recent years, authentication techniques have shifted to a multi-factor verification procedure. This involves proving a user's identity through many complimentary elements, which improves system security. The popularity of smart gadgets, including phones, tablets, and watches, enabled this growth. Smart devices can give a confirmation code to reinforce the primary authentication factor, often based on a user/password. Companies are looking for novel ways to improve their identification policies as data breaches and complex cyber threats become more prevalent. Designing a system with behavior identification is the need of today’s hour. To detect imposters when an authenticated session is hijacked in a real-world, or to identify the imposter in a continuous authentication method was designed and tested, and a rejection test was finally carried out.
Downloads
References
S. Mike, Unify and Simplify: Re-thinking Identity Management, Network Security. 2006(7) (2006), 11-14. doi: dx.doi.org/10.1016/S1353-4858(06)70411-1
R. Dhamija, and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, Security & Privacy, IEEE. 6(2) (2008) 24-29. doi: dx.doi.org/10.1109/MSP.2008.49.
S. Clare, Digital identity - The Legal Person? Computer Law & Security Review, Elsevier. 25(3) (2009) 227-236. doi: dx.doi.org/10.1016/j.clsr.2009.03.009.
P. Geraint, The benefits and drawbacks of using electronic identities, Information Security Technical Report, Elsevier. 13(2) (2008) 95-103. doi: dx.doi.org/10.1016/j.istr.2008.07.002.
G. Goth, Identity management, access specs are rolling along, Internet Computing, IEEE. l9(1) (2005), 9- 11. doi; dx.doi.org/10.1109/MIC.2005.16.
B. Geoff, The use of hardware tokens for identity management, Information Security Technical Report 9(1) (2004) 22-25. doi: dx.doi.org/10.1016/S1363- 4127(04)00012-3.
H. Marit, P. Andreas and S. Sandra, Identity management throughout one's whole life, Information Security Technical Report, Elsevier. 13(2) (2008) 83-94. doi: dx.doi.org/10.1016/j.istr.2008.06.003.
EconomyWatch, List of Commercial Banks; Available (January 2011)
Wikipedia, The free encyclopedia, Civil service; Available (January 2011): http://en.wikipedia.org/wiki/Civil_service
Top University, QS World University Rankings; Available (January 2011): http://www.topuniversities.com/universityrankings/world-university-rankings, 2011
Thomson Reuters, 100 Top Hospitals; Available (January 2011): http://www.100tophospitals.com/
Google Double Click Ad Planner; Available (April 2010): http://www.google.com/adplanner/static/top1000/#
Wikipedia, The free encyclopedia, List of social networking websites; Available (January 2011): http://en.wikipedia.org/wiki/List_of_social_networking
L. Anthony. AntConc: Design and Development of a Freeware Corpus Analysis Toolkit for the Technical Writing Classroom, in Professional Communication Conference Proceedings, (2005), pp. 729. doi:10.1109/IPCC.2005.1494244
C. Greaves, ConcApp Version 4 Concordancer, Edict Virtual Language Centre, Available (November 2010): http://www.edict.com.hk/PUB/concapp/.
TextSTAT Corpus, Available (November 2010) on: http://www.edict.com.hk/PUB/concapp/ Published by Atlantis Press Copyright: the authors 429
Neural-fuzzy multifactor authentication system 17. R. Togneri, and C. J. S. DeSilva, Fundamentals of Information Theory and Coding Design, (Chapman & Hall/ CRC Press, FL, 2005).
M. Negnevitsky, Artificial Intelligence: A Guide to Intelligent Systems, 2nd edn. (China Machine Press, 2005)
M. Fazle Azeem, M. Hanmandlu, N. Ahmad, Structure identification of generalized adaptive neuro-fuzzy inference systems, Fuzzy Systems, IEEE Transactions. 11(5) (3003) 666–681. doi:10.1109/TFUZZ.2003.817857.
J. I. Agbinya, R. Islam and C. Kwok, Development of Digital Environment Identity (DEITY) System for Online Access, in Broadband Communications, Information Technology & Biomedical Applications, Third Int. Conf., (Australia 2008), pp. 23-26, doi: 10.1109/BROADCOM.2008.52.
M. He, et al, Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems, Pattern
Recognition. 43(5) (2010) 1789-1800. doi: 10.1016/j.patcog.2009.11.018.
L. Nanni, A. Lumini, S. Brahnam, Likelihood Ratio Based Features for a Trained Biometric Score Fusion, Expert Systems with Applications. 38(1), (2011) 58-63. doi: 10.1016/j.eswa.2010.06.006.
F. Chong, Identity and Access Management, Microsoft Architect Journey. (2004).
European Technology Assessment Group, RFID and identity management in everyday life, Available online (October 2010) at: http://www.europarl.europa.eu/stoa/publications/studies/s toa182_en.pdf
The National Electronic Commerce Coordinating Council (NECCC), Identity Management, Presented at the NECCC Annual Conference, (New York, 2002).
M. Hansen, A. Schwartz and A. Cooper, Privacy and Identity Management, Security & Privacy, IEEE. 6 (2008). doi: 10.1109/MSP.2008.41.
M. Barisch, Modelling the Impact of Virtual Identities on Communication Infrastructures, Conference on Computer and Communications Security, in Proc. of the 5th ACM workshop, Digital identity management, (Chicago, Illinois, 2009) pp. 45–52. doi: http://doi.acm.org/10.1145/1655028.1655040.
G. Hidehito, User-Centric Identity Governance Across Domain Boundaries, Conference on Computer and Communications Security, in Proc. of the 5th ACM workshop, Digital identity management, (Chicago, Illinois, 2009) pp. 35–44. doi: http://doi.acm.org/10.1145/1655028.1655038.
V. Avram, Defining metrics to automate the quantitative analysis of textual information within a web page, in Int. Conf. of Application of Information and Communication Technologies, (AICT 2009), pp.1-5. d
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.