Abstract:
Authentication is a mechanism to verify identity of users. Those who can present valid credential are considered as authenticated identities. In this paper, we introduce ...Show MoreMetadata
Abstract:
Authentication is a mechanism to verify identity of users. Those who can present valid credential are considered as authenticated identities. In this paper, we introduce an adaptive authentication system called Unified Authentication Platform (UAP) which incorporates adaptive control to identify high-risk and suspicious illegitimate login attempts. The system evaluates comprehensive set of known information about the users from the past login history to define their normal behavior profile. The system leverages this information that has been previously stored to determine the security risk and level of assurance of current login attempt.
Published in: 2014 Science and Information Conference
Date of Conference: 27-29 August 2014
Date Added to IEEE Xplore: 09 October 2014
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- User Behavior ,
- User Behavior Analysis ,
- Security Risks ,
- Behavioral Profiles ,
- User Identification ,
- Unique Platform ,
- Current Attempts ,
- Authentication System ,
- Level Of Assurance ,
- Behavior Change ,
- Operating System ,
- Active Users ,
- Global Positioning System ,
- Combined Score ,
- Pattern Generator ,
- Public Key ,
- User Location ,
- Security Requirements ,
- Low Trust ,
- Digital Signature ,
- Authentication Method ,
- User Attributes ,
- Predefined Time Period ,
- Authentication Service ,
- Authentication Process
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- User Behavior ,
- User Behavior Analysis ,
- Security Risks ,
- Behavioral Profiles ,
- User Identification ,
- Unique Platform ,
- Current Attempts ,
- Authentication System ,
- Level Of Assurance ,
- Behavior Change ,
- Operating System ,
- Active Users ,
- Global Positioning System ,
- Combined Score ,
- Pattern Generator ,
- Public Key ,
- User Location ,
- Security Requirements ,
- Low Trust ,
- Digital Signature ,
- Authentication Method ,
- User Attributes ,
- Predefined Time Period ,
- Authentication Service ,
- Authentication Process
- Author Keywords