Designing a Framework for AI-Based User Authentication System through Behaviour Monitoring

Authors

  • Praveen Kumar Chandapeta Dr. A. P. J. Abdul Kalam University, Indore, M. P, India
  • Ajay Raundale Dr. A. P. J. Abdul Kalam University, Indore, M. P, India

Keywords:

Cybersecurity, assets, behaviour, authenticated, tested

Abstract

In the ever-changing cybersecurity landscape, Behavior Identification has emerged as an essential aspect of protecting any digital assets. In recent years, authentication techniques have shifted to a multi-factor verification procedure. This involves proving a user's identity through many complimentary elements, which improves system security. The popularity of smart gadgets, including phones, tablets, and watches, enabled this growth. Smart devices can give a confirmation code to reinforce the primary authentication factor, often based on a user/password. Companies are looking for novel ways to improve their identification policies as data breaches and complex cyber threats become more prevalent. Designing a system with behavior identification is the need of today’s hour. To detect imposters when an authenticated session is hijacked in a real-world, or to identify the imposter in a continuous authentication method was designed and tested, and a rejection test was finally carried out.

Downloads

Download data is not yet available.

References

S. Mike, Unify and Simplify: Re-thinking Identity Management, Network Security. 2006(7) (2006), 11-14. doi: dx.doi.org/10.1016/S1353-4858(06)70411-1

R. Dhamija, and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, Security & Privacy, IEEE. 6(2) (2008) 24-29. doi: dx.doi.org/10.1109/MSP.2008.49.

S. Clare, Digital identity - The Legal Person? Computer Law & Security Review, Elsevier. 25(3) (2009) 227-236. doi: dx.doi.org/10.1016/j.clsr.2009.03.009.

P. Geraint, The benefits and drawbacks of using electronic identities, Information Security Technical Report, Elsevier. 13(2) (2008) 95-103. doi: dx.doi.org/10.1016/j.istr.2008.07.002.

G. Goth, Identity management, access specs are rolling along, Internet Computing, IEEE. l9(1) (2005), 9- 11. doi; dx.doi.org/10.1109/MIC.2005.16.

B. Geoff, The use of hardware tokens for identity management, Information Security Technical Report 9(1) (2004) 22-25. doi: dx.doi.org/10.1016/S1363- 4127(04)00012-3.

H. Marit, P. Andreas and S. Sandra, Identity management throughout one's whole life, Information Security Technical Report, Elsevier. 13(2) (2008) 83-94. doi: dx.doi.org/10.1016/j.istr.2008.06.003.

EconomyWatch, List of Commercial Banks; Available (January 2011)

Wikipedia, The free encyclopedia, Civil service; Available (January 2011): http://en.wikipedia.org/wiki/Civil_service

Top University, QS World University Rankings; Available (January 2011): http://www.topuniversities.com/universityrankings/world-university-rankings, 2011

Thomson Reuters, 100 Top Hospitals; Available (January 2011): http://www.100tophospitals.com/

Google Double Click Ad Planner; Available (April 2010): http://www.google.com/adplanner/static/top1000/#

Wikipedia, The free encyclopedia, List of social networking websites; Available (January 2011): http://en.wikipedia.org/wiki/List_of_social_networking

L. Anthony. AntConc: Design and Development of a Freeware Corpus Analysis Toolkit for the Technical Writing Classroom, in Professional Communication Conference Proceedings, (2005), pp. 729. doi:10.1109/IPCC.2005.1494244

C. Greaves, ConcApp Version 4 Concordancer, Edict Virtual Language Centre, Available (November 2010): http://www.edict.com.hk/PUB/concapp/.

TextSTAT Corpus, Available (November 2010) on: http://www.edict.com.hk/PUB/concapp/ Published by Atlantis Press Copyright: the authors 429

Neural-fuzzy multifactor authentication system 17. R. Togneri, and C. J. S. DeSilva, Fundamentals of Information Theory and Coding Design, (Chapman & Hall/ CRC Press, FL, 2005).

M. Negnevitsky, Artificial Intelligence: A Guide to Intelligent Systems, 2nd edn. (China Machine Press, 2005)

M. Fazle Azeem, M. Hanmandlu, N. Ahmad, Structure identification of generalized adaptive neuro-fuzzy inference systems, Fuzzy Systems, IEEE Transactions. 11(5) (3003) 666–681. doi:10.1109/TFUZZ.2003.817857.

J. I. Agbinya, R. Islam and C. Kwok, Development of Digital Environment Identity (DEITY) System for Online Access, in Broadband Communications, Information Technology & Biomedical Applications, Third Int. Conf., (Australia 2008), pp. 23-26, doi: 10.1109/BROADCOM.2008.52.

M. He, et al, Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems, Pattern

Recognition. 43(5) (2010) 1789-1800. doi: 10.1016/j.patcog.2009.11.018.

L. Nanni, A. Lumini, S. Brahnam, Likelihood Ratio Based Features for a Trained Biometric Score Fusion, Expert Systems with Applications. 38(1), (2011) 58-63. doi: 10.1016/j.eswa.2010.06.006.

F. Chong, Identity and Access Management, Microsoft Architect Journey. (2004).

European Technology Assessment Group, RFID and identity management in everyday life, Available online (October 2010) at: http://www.europarl.europa.eu/stoa/publications/studies/s toa182_en.pdf

The National Electronic Commerce Coordinating Council (NECCC), Identity Management, Presented at the NECCC Annual Conference, (New York, 2002).

M. Hansen, A. Schwartz and A. Cooper, Privacy and Identity Management, Security & Privacy, IEEE. 6 (2008). doi: 10.1109/MSP.2008.41.

M. Barisch, Modelling the Impact of Virtual Identities on Communication Infrastructures, Conference on Computer and Communications Security, in Proc. of the 5th ACM workshop, Digital identity management, (Chicago, Illinois, 2009) pp. 45–52. doi: http://doi.acm.org/10.1145/1655028.1655040.

G. Hidehito, User-Centric Identity Governance Across Domain Boundaries, Conference on Computer and Communications Security, in Proc. of the 5th ACM workshop, Digital identity management, (Chicago, Illinois, 2009) pp. 35–44. doi: http://doi.acm.org/10.1145/1655028.1655038.

V. Avram, Defining metrics to automate the quantitative analysis of textual information within a web page, in Int. Conf. of Application of Information and Communication Technologies, (AICT 2009), pp.1-5. d

Downloads

Published

24.03.2024

How to Cite

Chandapeta , P. K. ., & Raundale , A. . (2024). Designing a Framework for AI-Based User Authentication System through Behaviour Monitoring . International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 99–105. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5049

Issue

Section

Research Article