Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. / Матюшин, Юрий Сергеевич; Корхов, Владимир Владиславович; Бусько, Илья Владимирович.
Computational Science and Its Applications – ICCSA 2024 Workshops . Springer Nature, 2024. p. 369-385 (Lecture Notes in Computer Science; Vol. 14821).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
}
TY - GEN
T1 - Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them
AU - Матюшин, Юрий Сергеевич
AU - Корхов, Владимир Владиславович
AU - Бусько, Илья Владимирович
PY - 2024/8/22
Y1 - 2024/8/22
N2 - User authentication remains one of the most pressing issues in modern cybersecurity, with traditional methods increasingly failing to meet the modern challenges. In particular, there is now a plethora of attacks traditional authentication algorithms are vulnerable to, and a successful attack can be seriously damaging for a system as a whole. For this reason, Continuous Authentication (CA) emerged as a new approach to securely authenticate users in a distributed system, with diverse methods using such technologies as machine learning, neural networks, behavioural biometrics, etc. However, several new attack vectors have been suggested that might compromise even CA-protected systems. In this article, we provide an analysis of possible attacks on various CA algorithms. Furthermore, we discuss the attacks’ limitations, various factors that might improve authentication systems’ resilience, as well as proposed defense mechanisms that could provide protection against these attacks. We conclude that most common CA methods today, while a step-up compared to traditional authentication methods, are still susceptible to being subverted, and implementing defense mechanisms and adopting security best practices should be an important consideration while designing a user authentication system
AB - User authentication remains one of the most pressing issues in modern cybersecurity, with traditional methods increasingly failing to meet the modern challenges. In particular, there is now a plethora of attacks traditional authentication algorithms are vulnerable to, and a successful attack can be seriously damaging for a system as a whole. For this reason, Continuous Authentication (CA) emerged as a new approach to securely authenticate users in a distributed system, with diverse methods using such technologies as machine learning, neural networks, behavioural biometrics, etc. However, several new attack vectors have been suggested that might compromise even CA-protected systems. In this article, we provide an analysis of possible attacks on various CA algorithms. Furthermore, we discuss the attacks’ limitations, various factors that might improve authentication systems’ resilience, as well as proposed defense mechanisms that could provide protection against these attacks. We conclude that most common CA methods today, while a step-up compared to traditional authentication methods, are still susceptible to being subverted, and implementing defense mechanisms and adopting security best practices should be an important consideration while designing a user authentication system
KW - Adversarial Attacks
KW - Continuous Authentication
KW - Cybersecurity
KW - Machine Learning
UR - https://www.mendeley.com/catalogue/23febdc5-2df7-339f-a25c-7fca69e686a3/
U2 - 10.1007/978-3-031-65308-7_26
DO - 10.1007/978-3-031-65308-7_26
M3 - Conference contribution
SN - 978-3-031-65307-0
T3 - Lecture Notes in Computer Science
SP - 369
EP - 385
BT - Computational Science and Its Applications – ICCSA 2024 Workshops
PB - Springer Nature
T2 - The 24th International Conference on Computational Science and Its Applications, ICCSA 2024
Y2 - 1 July 2024 through 4 July 2024
ER -
ID: 123444388