Affiliation:
1. 1 Department of Computer Science and Engineering , PES University , Bangalore , India
Abstract
Abstract
Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.
Reference18 articles.
1. Hassan, A., B. Nuseibeh, L. Pasquale. Engineering Adaptive Authentication. – In: Proc. of IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C’21), IEEE, 2021, pp. 275-280.
2. Lal, N. A., S. Prasad, M. Farik. A Review of Authentication Methods. – International Journal of Scientific & Technology Research, Vol. 5, 2016, pp. 246-249.
3. Bonneau, J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. – In: Proc. of IEEE Symposium on Security and Privacy, IEEE, 2012, pp. 538-552.
4. Wang, D., Z. Zhang, P. Wang, J. Yan, X. Huang. Targeted Online Password Guessing: An Underestimated Threat. – In: Proc. of ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 1242-1254.
5. Steinegger, R. H., D. Deckers, P. Giessler, S. Abeck. Risk-Basedauthenticator for Web Applications. – In: Proc. of 21st European Conference on Pattern Languages of Programs, 2016, pp. 1-11.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献