Standard

Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. / Матюшин, Юрий Сергеевич; Корхов, Владимир Владиславович; Бусько, Илья Владимирович.

Computational Science and Its Applications – ICCSA 2024 Workshops . Springer Nature, 2024. p. 369-385 (Lecture Notes in Computer Science; Vol. 14821).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Harvard

Матюшин, ЮС, Корхов, ВВ & Бусько, ИВ 2024, Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. in Computational Science and Its Applications – ICCSA 2024 Workshops . Lecture Notes in Computer Science, vol. 14821, Springer Nature, pp. 369-385, The 24th International Conference on Computational Science and Its Applications, ICCSA 2024, Ханой, Viet Nam, 1/07/24. https://doi.org/10.1007/978-3-031-65308-7_26

APA

Матюшин, Ю. С., Корхов, В. В., & Бусько, И. В. (2024). Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. In Computational Science and Its Applications – ICCSA 2024 Workshops (pp. 369-385). (Lecture Notes in Computer Science; Vol. 14821). Springer Nature. https://doi.org/10.1007/978-3-031-65308-7_26

Vancouver

Матюшин ЮС, Корхов ВВ, Бусько ИВ. Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. In Computational Science and Its Applications – ICCSA 2024 Workshops . Springer Nature. 2024. p. 369-385. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-031-65308-7_26

Author

Матюшин, Юрий Сергеевич ; Корхов, Владимир Владиславович ; Бусько, Илья Владимирович. / Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them. Computational Science and Its Applications – ICCSA 2024 Workshops . Springer Nature, 2024. pp. 369-385 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{0a3f864782d942538c7d71a0642b8dd2,
title = "Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them",
abstract = "User authentication remains one of the most pressing issues in modern cybersecurity, with traditional methods increasingly failing to meet the modern challenges. In particular, there is now a plethora of attacks traditional authentication algorithms are vulnerable to, and a successful attack can be seriously damaging for a system as a whole. For this reason, Continuous Authentication (CA) emerged as a new approach to securely authenticate users in a distributed system, with diverse methods using such technologies as machine learning, neural networks, behavioural biometrics, etc. However, several new attack vectors have been suggested that might compromise even CA-protected systems. In this article, we provide an analysis of possible attacks on various CA algorithms. Furthermore, we discuss the attacks{\textquoteright} limitations, various factors that might improve authentication systems{\textquoteright} resilience, as well as proposed defense mechanisms that could provide protection against these attacks. We conclude that most common CA methods today, while a step-up compared to traditional authentication methods, are still susceptible to being subverted, and implementing defense mechanisms and adopting security best practices should be an important consideration while designing a user authentication system",
keywords = "Adversarial Attacks, Continuous Authentication, Cybersecurity, Machine Learning",
author = "Матюшин, {Юрий Сергеевич} and Корхов, {Владимир Владиславович} and Бусько, {Илья Владимирович}",
year = "2024",
month = aug,
day = "22",
doi = "10.1007/978-3-031-65308-7_26",
language = "English",
isbn = "978-3-031-65307-0",
series = "Lecture Notes in Computer Science",
publisher = "Springer Nature",
pages = "369--385",
booktitle = "Computational Science and Its Applications – ICCSA 2024 Workshops",
address = "Germany",
note = "The 24th International Conference on Computational Science and Its Applications, ICCSA 2024, ICCSA ; Conference date: 01-07-2024 Through 04-07-2024",
url = "https://2024.iccsa.org/",

}

RIS

TY - GEN

T1 - Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them

AU - Матюшин, Юрий Сергеевич

AU - Корхов, Владимир Владиславович

AU - Бусько, Илья Владимирович

PY - 2024/8/22

Y1 - 2024/8/22

N2 - User authentication remains one of the most pressing issues in modern cybersecurity, with traditional methods increasingly failing to meet the modern challenges. In particular, there is now a plethora of attacks traditional authentication algorithms are vulnerable to, and a successful attack can be seriously damaging for a system as a whole. For this reason, Continuous Authentication (CA) emerged as a new approach to securely authenticate users in a distributed system, with diverse methods using such technologies as machine learning, neural networks, behavioural biometrics, etc. However, several new attack vectors have been suggested that might compromise even CA-protected systems. In this article, we provide an analysis of possible attacks on various CA algorithms. Furthermore, we discuss the attacks’ limitations, various factors that might improve authentication systems’ resilience, as well as proposed defense mechanisms that could provide protection against these attacks. We conclude that most common CA methods today, while a step-up compared to traditional authentication methods, are still susceptible to being subverted, and implementing defense mechanisms and adopting security best practices should be an important consideration while designing a user authentication system

AB - User authentication remains one of the most pressing issues in modern cybersecurity, with traditional methods increasingly failing to meet the modern challenges. In particular, there is now a plethora of attacks traditional authentication algorithms are vulnerable to, and a successful attack can be seriously damaging for a system as a whole. For this reason, Continuous Authentication (CA) emerged as a new approach to securely authenticate users in a distributed system, with diverse methods using such technologies as machine learning, neural networks, behavioural biometrics, etc. However, several new attack vectors have been suggested that might compromise even CA-protected systems. In this article, we provide an analysis of possible attacks on various CA algorithms. Furthermore, we discuss the attacks’ limitations, various factors that might improve authentication systems’ resilience, as well as proposed defense mechanisms that could provide protection against these attacks. We conclude that most common CA methods today, while a step-up compared to traditional authentication methods, are still susceptible to being subverted, and implementing defense mechanisms and adopting security best practices should be an important consideration while designing a user authentication system

KW - Adversarial Attacks

KW - Continuous Authentication

KW - Cybersecurity

KW - Machine Learning

UR - https://www.mendeley.com/catalogue/23febdc5-2df7-339f-a25c-7fca69e686a3/

U2 - 10.1007/978-3-031-65308-7_26

DO - 10.1007/978-3-031-65308-7_26

M3 - Conference contribution

SN - 978-3-031-65307-0

T3 - Lecture Notes in Computer Science

SP - 369

EP - 385

BT - Computational Science and Its Applications – ICCSA 2024 Workshops

PB - Springer Nature

T2 - The 24th International Conference on Computational Science and Its Applications, ICCSA 2024

Y2 - 1 July 2024 through 4 July 2024

ER -

ID: 123444388