Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23240
|View full text |Cite
|
Sign up to set email alerts
|

Who Are You? A Statistical Approach to Measuring User Authenticity

Abstract: Abstract-Passwords are used for user authentication by almost every Internet service today, despite a number of wellknown weaknesses. Numerous attempts to replace passwords have failed, in part because changing users' behavior has proven to be difficult. One approach to strengthening password-based authentication without changing user experience is to classify login attempts into normal and suspicious activity based on a number of parameters such as source IP, geo-location, browser configuration, and time of d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
136
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(139 citation statements)
references
References 31 publications
1
136
0
Order By: Relevance
“…Furthermore, we recommend that organizations take additional measures to mitigate the affect of an authentication server breach. Solutions might include mechanisms detect password breaches through the use of honey accounts or honey passwords [76], multi-factor authentication and fraud detection/correction algorithms to prevent suspicious/harmful behavior [91].…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, we recommend that organizations take additional measures to mitigate the affect of an authentication server breach. Solutions might include mechanisms detect password breaches through the use of honey accounts or honey passwords [76], multi-factor authentication and fraud detection/correction algorithms to prevent suspicious/harmful behavior [91].…”
Section: Discussionmentioning
confidence: 99%
“…Limited number of login attempts. Most PIN systems enforce suspicious login detection and lockout [23], and thus the number of PINs an attacker may try in an online attack is limited. A successful online attack is defined as an attacker hitting the correct PIN within the number of allowed attempts.…”
Section: Online Attacksmentioning
confidence: 99%
“…The limitations and effectiveness of these features were not estimated. Freeman et al [11] presented the, to the best of our knowledge, first publicly known RBA algorithm using IP address and user agent as features. Steinegger et al [26] presented another RBA implementation, with browser fingerprint, failed login attempts and IP based geolocation as features.…”
Section: Related Workmentioning
confidence: 99%
“…the low threshold and falls into the medium risk category, the service typically requests additional authentication factors from the user (e.g. verification of email address or phone number [17,24,11]), requires to solve a CAPTCHA [24], or informs the user about suspicious activities [13]. If the risk score is deemed high, the service can decide to block access altogether, but this event is rare, as it will not allow legitimate users mistakenly classified as a high risk to recover.…”
Section: Introductionmentioning
confidence: 99%