Adaptive authentication

Issues and challenges

Khairul Azmi Abu Bakar , Galoh Rashidah Haron

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication that consider those changes to identify high-risk and suspicious illegitimate login attempts. In this paper, we examine some of the adaptive authentication systems that have been proposed recently in the literature. Some of the issues and challenges when developing an adaptive authentication system are also discussed. We also introduce our own Unified Authentication Platform (UAP) which incorporates adaptive control. We describe two typical processes that are used in our Adaptive UAP.

Original languageEnglish
Title of host publication2013 World Congress on Computer and Information Technology, WCCIT 2013
DOIs
Publication statusPublished - 25 Nov 2013
Externally publishedYes
Event2013 World Congress on Computer and Information Technology, WCCIT 2013 - Sousse, Tunisia
Duration: 22 Jun 201324 Jun 2013

Other

Other2013 World Congress on Computer and Information Technology, WCCIT 2013
CountryTunisia
CitySousse
Period22/6/1324/6/13

Fingerprint

Authentication

Keywords

  • adaptive authentication
  • behavioral profile
  • multi-factor authentication

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Abu Bakar , K. A., & Haron, G. R. (2013). Adaptive authentication: Issues and challenges. In 2013 World Congress on Computer and Information Technology, WCCIT 2013 [6618657] https://doi.org/10.1109/WCCIT.2013.6618657

Adaptive authentication : Issues and challenges. / Abu Bakar , Khairul Azmi; Haron, Galoh Rashidah.

2013 World Congress on Computer and Information Technology, WCCIT 2013. 2013. 6618657.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abu Bakar , KA & Haron, GR 2013, Adaptive authentication: Issues and challenges. in 2013 World Congress on Computer and Information Technology, WCCIT 2013., 6618657, 2013 World Congress on Computer and Information Technology, WCCIT 2013, Sousse, Tunisia, 22/6/13. https://doi.org/10.1109/WCCIT.2013.6618657
Abu Bakar  KA, Haron GR. Adaptive authentication: Issues and challenges. In 2013 World Congress on Computer and Information Technology, WCCIT 2013. 2013. 6618657 https://doi.org/10.1109/WCCIT.2013.6618657
Abu Bakar , Khairul Azmi ; Haron, Galoh Rashidah. / Adaptive authentication : Issues and challenges. 2013 World Congress on Computer and Information Technology, WCCIT 2013. 2013.
@inproceedings{48eb25f107bb484599761e634a7ab901,
title = "Adaptive authentication: Issues and challenges",
abstract = "Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication that consider those changes to identify high-risk and suspicious illegitimate login attempts. In this paper, we examine some of the adaptive authentication systems that have been proposed recently in the literature. Some of the issues and challenges when developing an adaptive authentication system are also discussed. We also introduce our own Unified Authentication Platform (UAP) which incorporates adaptive control. We describe two typical processes that are used in our Adaptive UAP.",
keywords = "adaptive authentication, behavioral profile, multi-factor authentication",
author = "{Abu Bakar }, {Khairul Azmi} and Haron, {Galoh Rashidah}",
year = "2013",
month = "11",
day = "25",
doi = "10.1109/WCCIT.2013.6618657",
language = "English",
isbn = "9781479904600",
booktitle = "2013 World Congress on Computer and Information Technology, WCCIT 2013",

}

TY - GEN

T1 - Adaptive authentication

T2 - Issues and challenges

AU - Abu Bakar , Khairul Azmi

AU - Haron, Galoh Rashidah

PY - 2013/11/25

Y1 - 2013/11/25

N2 - Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication that consider those changes to identify high-risk and suspicious illegitimate login attempts. In this paper, we examine some of the adaptive authentication systems that have been proposed recently in the literature. Some of the issues and challenges when developing an adaptive authentication system are also discussed. We also introduce our own Unified Authentication Platform (UAP) which incorporates adaptive control. We describe two typical processes that are used in our Adaptive UAP.

AB - Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication that consider those changes to identify high-risk and suspicious illegitimate login attempts. In this paper, we examine some of the adaptive authentication systems that have been proposed recently in the literature. Some of the issues and challenges when developing an adaptive authentication system are also discussed. We also introduce our own Unified Authentication Platform (UAP) which incorporates adaptive control. We describe two typical processes that are used in our Adaptive UAP.

KW - adaptive authentication

KW - behavioral profile

KW - multi-factor authentication

UR - http://www.scopus.com/inward/record.url?scp=84887951414&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84887951414&partnerID=8YFLogxK

U2 - 10.1109/WCCIT.2013.6618657

DO - 10.1109/WCCIT.2013.6618657

M3 - Conference contribution

SN - 9781479904600

BT - 2013 World Congress on Computer and Information Technology, WCCIT 2013

ER -