Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild
Date: June 2019 Publication: 34th International Conference on ICT Systems Security and Privacy Protection (SEC 2019) Source 1: https://riskbasedauthentication.org/download/rba-study-paper-preprint.pdf Abstract or Summary:
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors and records additional implicit features during password entry such as device or geolocation information, and requests additional authentication factors for confirming the claimed identity if a certain risk level is detected. RBA is recommended by the NIST digital identity guidelines, is used by several large online services, and offers protection against security risks such as password database leaks, credential stuffing, insecure pass-words and large-scale guessing attacks. It also compensates low adoption rates of two-factor authentication. Despite its relevance, the procedures used by RBA-instrumented online services are currently not disclosed. Consequently, there is little scientific research about RBA, slowing down progress and deeper understanding, making it harder for end users to understand the security provided by the services they use and trust, and hindering the widespread adoption of RBA. In this paper, with a series of studies on eight popular online services, we (i) analyze which features and combinations/classifiers are used and are useful in practical instances, (ii) develop a framework and a methodology to measure RBA in the wild, and (iii) survey and discuss the differences in the user interface for RBA. Following this, our work provides a first deeper understanding of practical RBA deployments and helps fostering further research in this direction. PasswordResearch.com Note: Project page: https://riskbasedauthentication.org/
Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.
<-- Back to Authentication Research Paper Index |