Affiliation:
1. H-BRS University of Applied Sciences, Germany and Ruhr University Bochum, Bochum, Germany
2. Telenor Digital, Fornebu, Norway
3. H-BRS University of Applied Sciences, Sankt Augustin, Germany
Abstract
Risk-based authentication (RBA) aims to protect users against attacks involving stolen passwords. RBA monitors features during login, and requests re-authentication when feature values widely differ from those previously observed. It is recommended by various national security organizations, and users perceive it more usable than and equally secure to equivalent two-factor authentication. Despite that, RBA is still used by very few online services. Reasons for this include a lack of validated open resources on RBA properties, implementation, and configuration. This effectively hinders the RBA research, development, and adoption progress.
To close this gap, we provide the first long-term RBA analysis on a real-world large-scale online service. We collected feature data of 3.3 million users and 31.3 million login attempts over more than 1 year. Based on the data, we provide (i) studies on RBA’s real-world characteristics plus its configurations and enhancements to balance usability, security, and privacy; (ii) a machine learning–based RBA parameter optimization method to support administrators finding an optimal configuration for their own use case scenario; (iii) an evaluation of the round-trip time feature’s potential to replace the IP address for enhanced user privacy; and (iv) a synthesized RBA dataset to reproduce this research and to foster future RBA research. Our results provide insights on selecting an optimized RBA configuration so that users profit from RBA after just a few logins. The open dataset enables researchers to study, test, and improve RBA for widespread deployment in the wild.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference73 articles.
1. Secure client and server geolocation over the internet;Abdou Abdelrahman;;login: Spring 2018,2018
2. TypeNet: Scaling up Keystroke Biometrics
3. Credential stuffing: Attacks and economies;[state of the internet] / security,2019
4. Loyalty for sale – retail and hospitality fraud;[state of the internet] / security,2020
5. Device fingerprinting for augmenting web authentication
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献