Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1609
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De Silva, H.L.S.R.P. | - |
dc.contributor.author | Claude Wittebron, D. | - |
dc.contributor.author | Lahiru, A.M.R. | - |
dc.contributor.author | Madumadhavi, K.L. | - |
dc.contributor.author | Rupasinghe, L. | - |
dc.contributor.author | Abeywardena, K.Y. | - |
dc.date.accessioned | 2022-03-14T08:18:00Z | - |
dc.date.available | 2022-03-14T08:18:00Z | - |
dc.date.issued | 2019-12-05 | - |
dc.identifier.isbn | 978-1-7281-4170-1/19 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1609 | - |
dc.description | Date of Conference: 5-7 Dec. 2019 Date Added to IEEE Xplore: 29 May 2020 | en_US |
dc.description.abstract | Adaptive authentication refers to the way that configures two factors or multi-factor authentication, based on the user’s risk profile. One of the most pressing concerns in modern days is the security of credentials. As a solution, developers have introduced the multifactor authentication. The multi-factor authentication has an adverse effect on user experience. This paper proposes a novel adaptive authentication mechanism which tries to eradicate the negative user experience of the traditional multi factor authentication systems. Adaptive authentication gathers information about each user and prevents fraudulent attempts by validating them against the created profiles. This approach will increase the usability, user-friendliness by introducing multi-factor authentication only when its necessary using a risk based adaptive approach. Furthermore, the solution ensures security by authenticating the legitimate user through collectively analyzing the properties, behavior, device and network related information. In the creation of the user profile, the adaptive authentication system will gather and analyze the user typing behaviors using a unique recurrent neural network algorithm named LSTMs with 95.55% accuracy and mouse behaviors using SVMs with 95.48% accuracy. In device-based authentication, a fingerprint is generated to the browser and to the mobile device which is utilized in the analysis of the accuracy rate of the authentication. Blacklisting and whitelisting of the networks and geo velocity of the authentication request are captured under the geolocation and network-based authentication. All the accuracy rates are fed to the risk-based authentication which helps the decision of re-authentication or in the grant of access to the system by analyzing the risk score generated for the authentication request. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2019 1st International Conference on Advancements in Computing (ICAC), SLIIT | en_US |
dc.relation.ispartofseries | Vol.1; | - |
dc.subject | RNN | en_US |
dc.subject | LSTMs | en_US |
dc.subject | SVM | en_US |
dc.subject | Naive-Bayesian | en_US |
dc.subject | Authentication | en_US |
dc.title | AuthDNA: An Adaptive Authentication Service for any Identity Server | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC49085.2019.9103382 | en_US |
Appears in Collections: | 1st International Conference on Advancements in Computing (ICAC) | 2019 Department of Computer Systems Engineering-Scopes Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AuthDNA_An_Adaptive_Authentication_Service_for_any_Identity_Server.pdf Until 2050-12-31 | 828.98 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.