Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1609
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDe Silva, H.L.S.R.P.-
dc.contributor.authorClaude Wittebron, D.-
dc.contributor.authorLahiru, A.M.R.-
dc.contributor.authorMadumadhavi, K.L.-
dc.contributor.authorRupasinghe, L.-
dc.contributor.authorAbeywardena, K.Y.-
dc.date.accessioned2022-03-14T08:18:00Z-
dc.date.available2022-03-14T08:18:00Z-
dc.date.issued2019-12-05-
dc.identifier.isbn978-1-7281-4170-1/19-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1609-
dc.descriptionDate of Conference: 5-7 Dec. 2019 Date Added to IEEE Xplore: 29 May 2020en_US
dc.description.abstractAdaptive authentication refers to the way that configures two factors or multi-factor authentication, based on the user’s risk profile. One of the most pressing concerns in modern days is the security of credentials. As a solution, developers have introduced the multifactor authentication. The multi-factor authentication has an adverse effect on user experience. This paper proposes a novel adaptive authentication mechanism which tries to eradicate the negative user experience of the traditional multi factor authentication systems. Adaptive authentication gathers information about each user and prevents fraudulent attempts by validating them against the created profiles. This approach will increase the usability, user-friendliness by introducing multi-factor authentication only when its necessary using a risk based adaptive approach. Furthermore, the solution ensures security by authenticating the legitimate user through collectively analyzing the properties, behavior, device and network related information. In the creation of the user profile, the adaptive authentication system will gather and analyze the user typing behaviors using a unique recurrent neural network algorithm named LSTMs with 95.55% accuracy and mouse behaviors using SVMs with 95.48% accuracy. In device-based authentication, a fingerprint is generated to the browser and to the mobile device which is utilized in the analysis of the accuracy rate of the authentication. Blacklisting and whitelisting of the networks and geo velocity of the authentication request are captured under the geolocation and network-based authentication. All the accuracy rates are fed to the risk-based authentication which helps the decision of re-authentication or in the grant of access to the system by analyzing the risk score generated for the authentication request.en_US
dc.language.isoenen_US
dc.publisher2019 1st International Conference on Advancements in Computing (ICAC), SLIITen_US
dc.relation.ispartofseriesVol.1;-
dc.subjectRNNen_US
dc.subjectLSTMsen_US
dc.subjectSVMen_US
dc.subjectNaive-Bayesianen_US
dc.subjectAuthenticationen_US
dc.titleAuthDNA: An Adaptive Authentication Service for any Identity Serveren_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICAC49085.2019.9103382en_US
Appears in Collections:1st International Conference on Advancements in Computing (ICAC) | 2019
Department of Computer Systems Engineering-Scopes
Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
AuthDNA_An_Adaptive_Authentication_Service_for_any_Identity_Server.pdf
  Until 2050-12-31
828.98 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.