Open Access   Article Go Back

Risk-Based Authentication using Autoencoders

Bharat Sharma1 , Sidharth Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 155-160, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.155160

Online published on Jul 31, 2019

Copyright © Bharat Sharma, Sidharth Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bharat Sharma, Sidharth Singh, “Risk-Based Authentication using Autoencoders,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.155-160, 2019.

MLA Style Citation: Bharat Sharma, Sidharth Singh "Risk-Based Authentication using Autoencoders." International Journal of Computer Sciences and Engineering 7.7 (2019): 155-160.

APA Style Citation: Bharat Sharma, Sidharth Singh, (2019). Risk-Based Authentication using Autoencoders. International Journal of Computer Sciences and Engineering, 7(7), 155-160.

BibTex Style Citation:
@article{Sharma_2019,
author = {Bharat Sharma, Sidharth Singh},
title = {Risk-Based Authentication using Autoencoders},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {155-160},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4737},
doi = {https://doi.org/10.26438/ijcse/v7i7.155160}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.155160}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4737
TI - Risk-Based Authentication using Autoencoders
T2 - International Journal of Computer Sciences and Engineering
AU - Bharat Sharma, Sidharth Singh
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 155-160
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
1066 363 downloads 171 downloads
  
  
           

Abstract

Verification gives a way to check the authenticity of a client attempting to get to any classified or delicate data. The requirement for ensuring secure information facilitated on the web has been rising exponentially as associations are moving their applications on the web. Static techniques for validation can`t totally ensure the validity of a client. This has prompted the advancement of multifaceted validation frameworks. Risk-based validation; a type of multifaceted verification adjusts as per the risk profile of the clients. This paper advances the plan of risk motor incorporated with the framework to inspect the client`s past login records and produce an appropriate example utilizing AI calculations to figure the risk dimension of the client. The risk level further chooses the confirmation technique that the client will be tested with. In this manner the versatile verification model aides in giving a more elevated amount of security to its clients.

Key-Words / Index Term

User Metadata, Risk Metadata, Authentication System

References

[1] Kumar Abhishek, SahanaRoshan, Prabhat Kumar and Rajeev Ranjan. "A comprehensive study on Multifactor Authentication Schemes". Advances in Computing and Information Technology, 177, pp. 561-568,2013.
[2] Tubin G (2005) Emergence of risk-based authentication in online financial services: You Can’t Hide Your Lyin’ IP. Whitepaper #V43:15N, Tower Group, May
[3] Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools Appl 57(1):49–66
[4] Orozco M, Graydon M, Shirmohammadi S, El Saddik A (2012) Experiments in haptic-based authentication of humans, International Journal of Multimedia Tools and Applications - Springer Science + Business Media B.V.
[5] Issa Traore & Isaac Woungang & Mohammad S. Obaidat & Youssef Nakkabi & Iris La in Springer Science+Business Media New York 2013 DOI 10.1007/s11042-013-1518-5
[6] Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In Proc. of the 3rd Annual Conference on Trust Management (iTrust’05),
[7] Mohan V. Pawar, Anuradha J. " Network Security and Types of Attacks in Network". Procedia Computer Science 48, pp. 503 – 506,2015.
[8] Oded Peer, Yedidya Dotan, Yael Villa and Marcelo Blatt. "USING BASELINE PROFILES IN ADAPTIVE AUTHENTICATION". US Patent 8,621,586 B1, December 31,2013.
[9] Misbahuddin, Dr Mohammed & Premchand, P & Govardhan, Dr. (2008). A user-friendly password authenticated key agreement For web based services. 10.1109/INNOVATIONS.2008.4781766.
[10] Environment", in International Conference on Advances in Computing, Communication and Control (ICAC3’09)
[11] DipankarDasgupta, Arunava Roy and Abhijit Nag. "Toward the design of adaptive selection strategies for multi-factor authentication". computers& security, pp. 85–116,2016.