Behavioural Analytics: Beyond Risk-based MFA

01/08/2018
by   Roy Henha Eyono, et al.
0

This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous work to move beyond a risk-based multi-factor authentication system. It adds a behavioural analytics component that uses keystroke dynamics to grant or deny users access. Given the increasing number of compromised user credential stores, we make the assumption that criminals already know the user credentials. Hence, to test our solution, users were given authentic user credentials and asked to login to our proof-of-concept. Despite the fact that all illegitimate users in our test cases were given the correct user credentials for legitimate users, none of these were granted access by the system. This demonstrates zero- tolerance to false positives. The results demonstrate the uniqueness of keystroke dynamics and its use to prevent users with stolen credentials from accessing systems they are not authorized to access.

READ FULL TEXT
research
09/24/2019

On the Design and Analysis of a Biometric Authentication System using Keystroke Dynamics

This paper proposes a portable hardware token for user authentication, i...
research
05/26/2022

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Static authentication methods, like passwords, grow increasingly weak wi...
research
11/10/2021

A Visual Analytics Framework for Distributed Data Analysis Systems

This paper proposes a visual analytics framework that addresses the comp...
research
10/05/2022

A novel non-linear transformation based multi-user identification algorithm for fixed text keystroke behavioral dynamics

In this paper, we propose a new technique to uniquely classify and ident...
research
04/21/2021

How to Identify and Authenticate Users in Massive Unsourced Random Access

Identification and authentication are two basic functionalities of tradi...
research
08/29/2023

Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins

Risk-based authentication (RBA) aims to protect end-users against attack...
research
04/07/2020

TypeNet: Scaling up Keystroke Biometrics

We study the suitability of keystroke dynamics to authenticate 100K user...

Please sign up or login with your details

Forgot password? Click here to reset