Defending Against Identity Threats Using Risk-Based Authentication
نویسندگان
چکیده
Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, strategic means authenticating authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive risk-based. Zero-trust principles are incorporated by collecting sign-in logs analyzing them continually check any anomalies, making it a dynamic approach. Users categorized as risky non-risky based on calculated risk scores. While many mechanisms been proposed, they confine identities only users. also considers devices having an categorizes safe or unsafe devices. Further, results displayed dashboard, easy administrators analyze wise decisions like multifactor authentication, mitigation, other control such.
منابع مشابه
Defending Against Advanced Persistent Threats Using Game-Theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailab...
متن کاملDefending against Malicious Rogue System Threats
by Chad D. Mano With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This dissertation addresses the rogue system problem, a significant threat in modern networks. A rogue system is a device installed within a network witho...
متن کاملDefending RFID authentication protocols against DoS attacks
In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...
متن کاملDefending against insider threats and internal data leakage
In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders try...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybernetics and Information Technologies
سال: 2023
ISSN: ['1311-9702', '1314-4081']
DOI: https://doi.org/10.2478/cait-2023-0016