2022
DOI: 10.1145/3546069
|View full text |Cite
|
Sign up to set email alerts
|

Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service

Abstract: Risk-based authentication (RBA) aims to protect users against attacks involving stolen passwords. RBA monitors features during login, and requests re-authentication when feature values widely differ from previously observed ones. It is recommended by various national security organizations, and users perceive it more usable and equally secure than equivalent two-factor authentication. Despite that, RBA is still only used by very few online services. Reasons for this include a lack of validated open resources o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 41 publications
1
18
0
Order By: Relevance
“…In particular, when an abnormality on a set of attributes regarding user’s behavior has been detected (i.e., event-driven approach), a real-time risk score is estimated, and if this risk score is above an acceptable threshold (i.e., high risk score), re-authentication will be triggered. It is clear that accurate risk estimation (i.e., computation of an accurate risk score of an action or event) plays a key role in risk-based continuous user authentication as it might impact its overall usability and security [ 27 , 28 ].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In particular, when an abnormality on a set of attributes regarding user’s behavior has been detected (i.e., event-driven approach), a real-time risk score is estimated, and if this risk score is above an acceptable threshold (i.e., high risk score), re-authentication will be triggered. It is clear that accurate risk estimation (i.e., computation of an accurate risk score of an action or event) plays a key role in risk-based continuous user authentication as it might impact its overall usability and security [ 27 , 28 ].…”
Section: Discussionmentioning
confidence: 99%
“…On top of that, attack data might be also taken into consideration by the statistical model of Freeman et al [ 33 ] for more accurate login attempt classification (normal/suspicious). However, Wiefling et al [ 27 ] highlighted that use cases without attack data are more common in real-world applications, especially for medium- and small-sized websites that have limited storage and computing capacity. In this case, and considering that all users are equally likely to be attacked, Wiefling et al considered the attack probability as follows: , where U is the set of users and u ∈ U [ 27 ].…”
Section: Quantitative Risk Estimation Approaches (Qreas)mentioning
confidence: 99%
See 3 more Smart Citations