Knowledge

Risk-based authentication

Source đź“ť

132:
authentication is necessary. If the risk is deemed appropriate, enhanced authentication will be triggered, such as a one time password delivered via an out of band communication. Risk based authentication can also be used during the session to prompt for additional authentication when the customer performs a certain high risk transaction, such as a money transfer or an address change. Risk based authentication is very beneficial to the customer because additional steps are only required if something is out of the ordinary, such as the login attempt is from a new machine.
22: 581: 131:
Machine authentication is often used in a risk based authentication set up. The machine authentication will run in the background and only ask the customer for additional authentication if the computer is not recognized. In a risk based authentication system, the institution decides if additional
126:
is a non-static authentication system which takes into account the profile (IP address, User-Agent HTTP header, time of access, and so on) of the agent requesting access to the system to determine the risk profile associated with that transaction. The risk profile is then used to determine the
127:
complexity of the challenge. Higher risk profiles leads to stronger challenges, whereas a static username/password may suffice for lower-risk profiles. Risk-based implementation allows the application to challenge the user for additional credentials only when the risk level is appropriate.
321: 141:
The point is that user validation accuracy is improved without inconveniencing a user, and risk-based authentication is used by major companies.
416: 86: 39: 515:
Borky, John M.; Bradley, Thomas H. (2019). "Protecting Information with Cybersecurity". In Borky, John M.; Bradley, Thomas H. (eds.).
58: 165:, user behaviour) has to be detected and used to compute the risk profile. Lack of proper detection may lead to unauthorized access. 368:. IFIP Advances in Information and Communication Technology. Vol. 562. Springer International Publishing. pp. 134–148. 65: 647: 618: 534: 474: 289: 72: 150:
The system that computes the risk profile has to be diligently maintained and updated as new threats emerge. Improper
54: 391: 222: 105: 657: 642: 637: 257:"What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics" 181: 43: 443:"More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication" 210: 198: 192: 662: 204: 79: 316: 611: 228: 187: 592: 216: 492:"Who uses RBA? We found evidence that Google, Facebook, LinkedIn, Amazon and GOG.com are using it" 652: 32: 151: 604: 442: 361: 158: 8: 362:"Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild" 176: 545: 450: 397: 369: 295: 267: 162: 530: 470: 401: 387: 299: 285: 319:, Takaya Kato, "Risk-based authentication patent", issued March 29, 2006 540: 522: 460: 379: 364:. In Dhillon, Gurpreet; Karlsson, Fredrik; Hedström, Karin; ZĂşquete, AndrĂ© (eds.). 277: 565: 526: 449:. ACSAC '20. Austin, USA: Association for Computing Machinery. pp. 203–218. 383: 281: 588: 516: 119: 631: 465: 491: 336: 256: 21: 455: 441:
Wiefling, Stephan; DĂĽrmuth, Markus; Lo Iacono, Luigi (2020-12-07).
374: 272: 255:
Wiefling, Stephan; DĂĽrmuth, Markus; Lo Iacono, Luigi (2021-01-26).
311: 309: 580: 306: 521:. Cham: Springer International Publishing. pp. 345–404. 360:
Wiefling, Stephan; Lo Iacono, Luigi; DĂĽrmuth, Markus (2019).
234: 440: 359: 254: 490:
Wiefling, Stephan; Lo Iacono, Luigi; DĂĽrmuth, Markus.
335:
Wiefling, Stephan; Lo Iacono, Luigi; DĂĽrmuth, Markus.
489: 334: 46:. Unsourced material may be challenged and removed. 337:"Information website on Risk-based Authentication" 629: 447:Annual Computer Security Applications Conference 612: 266:. FC '21. Vol. 12675. pp. 361–381. 514: 417:"Enhanced Authentication In Online Banking" 366:ICT Systems Security and Privacy Protection 619: 605: 414: 544: 518:Effective Model-Based Systems Engineering 464: 454: 373: 271: 106:Learn how and when to remove this message 264:Financial Cryptography and Data Security 587:This cryptography-related article is a 630: 235:Rule-set-based access control (RSBAC) 575: 424:Journal of Economic Crime Management 157:The user's connection profile (e.g. 44:adding citations to reliable sources 15: 13: 14: 674: 223:Organisation-based access control 579: 154:may lead to unauthorized access. 20: 31:needs additional citations for 508: 483: 434: 408: 353: 328: 248: 182:Attribute-based access control 1: 241: 648:Applications of cryptography 591:. You can help Knowledge by 527:10.1007/978-3-319-95669-5_10 384:10.1007/978-3-030-22312-0_10 282:10.1007/978-3-662-64331-0_19 211:Lattice-based access control 199:Discretionary access control 193:Context-based access control 144: 7: 169: 55:"Risk-based authentication" 10: 679: 574: 566:U.S. patent 20,050,097,320 205:Graph-based access control 496:Risk-based Authentication 341:Risk-based Authentication 315: 229:Role-based access control 188:Capability-based security 124:risk-based authentication 217:Mandatory access control 658:Password authentication 643:Computer access control 466:10.1145/3427228.3427243 415:Williamson, G. (2006). 638:Authentication methods 139: 317:US patent 9021555 129: 40:improve this article 177:Access control list 161:, connection type, 663:Cryptography stubs 163:keystroke dynamics 600: 599: 536:978-3-319-95669-5 476:978-1-4503-8858-0 291:978-3-662-64330-3 116: 115: 108: 90: 670: 621: 614: 607: 583: 576: 568: 557: 556: 554: 553: 548: 512: 506: 505: 503: 502: 487: 481: 480: 468: 458: 438: 432: 431: 421: 412: 406: 405: 377: 357: 351: 350: 348: 347: 332: 326: 325: 324: 320: 313: 304: 303: 275: 261: 252: 137: 111: 104: 100: 97: 91: 89: 48: 24: 16: 678: 677: 673: 672: 671: 669: 668: 667: 628: 627: 626: 625: 572: 564: 561: 560: 551: 549: 537: 513: 509: 500: 498: 488: 484: 477: 439: 435: 419: 413: 409: 394: 358: 354: 345: 343: 333: 329: 322: 314: 307: 292: 259: 253: 249: 244: 239: 172: 147: 138: 136: 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 676: 666: 665: 660: 655: 653:Access control 650: 645: 640: 624: 623: 616: 609: 601: 598: 597: 584: 570: 569: 559: 558: 535: 507: 482: 475: 433: 407: 392: 352: 327: 305: 290: 246: 245: 243: 240: 238: 237: 232: 226: 220: 214: 208: 202: 196: 190: 185: 179: 173: 171: 168: 167: 166: 159:IP Geolocation 155: 146: 143: 134: 120:authentication 114: 113: 28: 26: 19: 9: 6: 4: 3: 2: 675: 664: 661: 659: 656: 654: 651: 649: 646: 644: 641: 639: 636: 635: 633: 622: 617: 615: 610: 608: 603: 602: 596: 594: 590: 585: 582: 578: 577: 573: 567: 563: 562: 547: 542: 538: 532: 528: 524: 520: 519: 511: 497: 493: 486: 478: 472: 467: 462: 457: 452: 448: 444: 437: 429: 425: 418: 411: 403: 399: 395: 393:9783030223120 389: 385: 381: 376: 371: 367: 363: 356: 342: 338: 331: 318: 312: 310: 301: 297: 293: 287: 283: 279: 274: 269: 265: 258: 251: 247: 236: 233: 230: 227: 224: 221: 218: 215: 212: 209: 206: 203: 200: 197: 194: 191: 189: 186: 183: 180: 178: 175: 174: 164: 160: 156: 153: 152:configuration 149: 148: 142: 133: 128: 125: 121: 110: 107: 99: 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: â€“  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 593:expanding it 586: 571: 550:. Retrieved 517: 510: 499:. Retrieved 495: 485: 446: 436: 427: 423: 410: 365: 355: 344:. Retrieved 340: 330: 263: 250: 140: 130: 123: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 430:(2): 18–19. 632:Categories 552:2023-08-28 501:2019-04-29 456:2010.00339 375:2003.07622 346:2019-04-29 273:2101.10681 242:References 96:March 2011 66:newspapers 402:189926752 300:231709486 145:Criticism 170:See also 135:—  546:7122347 225:(OrBAC) 80:scholar 543:  533:  473:  400:  390:  323:  298:  288:  231:(RBAC) 213:(LBAC) 207:(GBAC) 195:(CBAC) 184:(ABAC) 82:  75:  68:  61:  53:  451:arXiv 420:(PDF) 398:S2CID 370:arXiv 296:S2CID 268:arXiv 260:(PDF) 219:(MAC) 201:(DAC) 87:JSTOR 73:books 589:stub 531:ISBN 471:ISBN 388:ISBN 286:ISBN 59:news 541:PMC 523:doi 461:doi 380:doi 278:doi 118:In 42:by 634:: 539:. 529:. 494:. 469:. 459:. 445:. 426:. 422:. 396:. 386:. 378:. 339:. 308:^ 294:. 284:. 276:. 262:. 122:, 620:e 613:t 606:v 595:. 555:. 525:: 504:. 479:. 463:: 453:: 428:4 404:. 382:: 372:: 349:. 302:. 280:: 270:: 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Risk-based authentication"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
authentication
configuration
IP Geolocation
keystroke dynamics
Access control list
Attribute-based access control
Capability-based security
Context-based access control
Discretionary access control
Graph-based access control
Lattice-based access control
Mandatory access control
Organisation-based access control
Role-based access control
Rule-set-based access control (RSBAC)
"What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics"
arXiv
2101.10681
doi

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑