SlideShare a Scribd company logo
Automated Login Method Selection in a Multi-
modal Authentication System
Login Method Selection based on User Behavior
CHANG PEI SHAN
Security Information Lab
Mimos Berhad
Kuala Lumpur, Malaysia
ps.chang@mimos.my
DAHLIA DIN
Security Information Lab
Mimos Berhad
Kuala Lumpur, Malaysia
dahlia.din@mimos.my
WONG HON LOON
Security Information Lab
Mimos Berhad
Kuala Lumpur, Malaysia
hl.wong@mimos.my
SEA CHONG SEAK
Security Information Lab
Mimos Berhad
Kuala Lumpur, Malaysia
cssea@mimos.my
LEE KAY WIN
Security Information Lab
Mimos Berhad
Kuala Lumpur, Malaysia
kw.lee@mimos.my
Abstract² $Q LQWHOOLJHQW PRGHO LV SURSRVHG WR
DXWRPDWHVHOHFWLRQRIORJLQDXWKHQWLFDWLRQPHWKRGLQD
PXOWLPRGHO DXWKHQWLFDWLRQ VVWHP EDVHG RQ XVHU
EHKDYLRU SURILOH 7KH SURSRVHG SURWRFRO DQDO]HV WKH
XVHUEHKDYLRUGDWDWRPLQLPL]HWKHSURFHVVLQUHDOWLPH
DQGSUHYHQWXQWUXVWHGDWWHPSW PHDQZKLOHLWDEOHWR
IDFLOLWDWHIULFWLRQOHVVXVHUH[SHULHQFHLQDPXOWLPRGDO
DXWKHQWLFDWLRQ VVWHP 7KH SURSRVHG VVWHP
GHWHUPLQHV D XVHU DW D ORJLQ LQWHUIDFH DQG UHWULHYHV
WKHXVHU¶VEHKDYLRUDOKLVWRULFDOGDWDDVLWVGHWHUPLQDQW
IDFWRUV PDWFKLQJ XVHU EHKDYLRU EDVHG RQ GDWD
UHWULHYDOIURPGDWDEDVH:KHUHLQWKHEHKDYLRUDOGDWD
LQFOXGHV WKH XVHU¶V ORJLQ VHVVLRQV WLPH JHRORFDWLRQ
DFFHVVHGDSSOLFDWLRQDQGWSHRIXVHUDJHQWXVHG7KH
VVWHPSURFHVVHVWKHEHKDYLRUDOGDWDWRJHQHUDWHDXVHU
SURILOHEDSURILOLQJPRGXOHDWWKDWSRLQWHYDOXDWHV
WKH XVHU¶V SURILOH E IDFWRULQJ LQ HQYLURQPHQWDO
SDUDPHWHUV RI WKH XVHU WHUPLQDO WR VHOHFW DQ
DXWKHQWLFDWLRQPHWKRGEDQHYDOXDWLRQPRGXOH7KH
VHOHFWHG DXWKHQWLFDWLRQ PHWKRG ZLOO EH GLVSODHG IRU
WKHXVHUWRFRPSOHWHWKHDXWKHQWLFDWLRQSURFHVV2QWKH
RWKHU KDQG WKH VVWHP ZLOO XSGDWLQJ WKH XVHU SURILOH
ZLWKGDWDUHODWLQJWRDQHZVXFFHVVIXOORJLQVHVVLRQIRU
IXWXUHHYDOXDWLRQ
Keywords - Automated Method Selection, Multi-
modal Authentication system, User Historical Profile,
Profiling Module, Environmental Parameters,
Evaluation Module, Normalized Distribution
I. INTRODUCTION
In the past couple of years, we have witnessed the rapid
development of technology especially on cloud and
network computing and it has significant impact on the
world today. Users enjoy the technology to reduce the
operating time, improve operation efficiency and other
convenience by registered and stored all their confidential
personal data in cloud application or others web-based
programs. Unfortunately, the vast majority of network
attacks are initiated, the cloud terminal of the weight loss
caused by the end user security environment weakened, the
client is more susceptible to viruses and Trojans infected,
the user password is stolen incident has increased, all of
this lead to face with more severe information security
challenges [1].
Hence, the user authentication is essential requirement
for current protected web-based applications nowadays.
The common ways of authentication is through passwords
(knowledge-based security), fingerprint or face (inherence
factors) and ID cards (token based security) which are
normally accustomed limit access to a variety of systems
[2]. Initially, a traditional authentication mechanism
provides a sole authentication method for user to proceed
in a secure web page access. However, current
development in information technology manages to
decouple authentication function from application, thus
allowing for new possibilities for the application to counter
the internet fraud in a more cost effective way [3]. In this
case, the traditional identity authentication and content
authentication cannot meet the basic security needs of the
web-based application and cloud computing environment
[4].
Therefore, multifactor authentication is required which
is a security system that requires more than one method of
authentication from independent categories of credentials
to verify the user’s identity for a login or other transaction
[5]. Then again, to let user must aware and able to provide
“what the user has” and “what the user knows”, a multi-
modal authentication system called MIMOS Unified
Authentication Platform (Mi-UAP) is being introduced by
author’s team member. Multi-modal means, multiple
authentication methods are provided for user to access a
web application. Stand arise this multi-model
authentication system, user able to select a login option
they confident to provide for the current situation for
completing a successful authentication. Furthermore, the
current development phase is to generate an automated
selection of login method for user in a multi-modal
authentication system for facilitating frictionless and
improve user experience.
The rest of the paper is organized and structured as
follows. In Section II, we look into the background of our
authentication system Mi-UAP platform. We define the
related work by introduce the experimental environment
and user historical data analysis from our production in
Session III. For session IV, we introduce solution by
describe the architecture and flow of our design idea, as
120
978-1-5386-8546-4/19/$31.00 ©2019 IEEE
well as the analysis results based on collected historical
data. In Section V, we include the major findings relate to
the analysis we have done. Finally, we describe the
benefits and limitations of the proposed protocol, also the
future work in the conclusion section.
II. BACKGROUND
A. Platform Architecture
The organization Information System Security
research lab has developed a multi-modal authentication
platform named Mi-UAP to provide a convenient and
user-friendly service for both organizations and individual
users [6]. Mi-UAP provides an infrastructure which able
deliver authentication services to applications with the
authentication mechanism decoupled from application
implementation. This is a self-managed system which
incurs zero administrative effort [3]. Besides, a user has
an option to use any login method based on user’s
preference as six authentication login options is available
for users to select.
The authentication method implemented in our
platform depicted in Figure 1 includes four common
authentication methods used today which is password,
certificate, One Time Password (OTP) token and OTP
SMS; and other two proprietary authentication methods
was introduce and developed by the authors which is
Time-Constrained Key (TCK) and 2DBarcode. The
development and production spanned for eight years. The
authentication methods are progressively added, case by
case basis, either as new project requirements or to solve
problems raised from previous authentication method [4].
)LJ0L8$33ODWIRUP$UFKLWHFWXUH
The benefits of the authentication platform utilizes
Single Sign-On (SSO) for a seamless environment
operation and adaptive authentication with threat response
without modifying existing applications [6]. Mi-UAP also
able support two factors authentication, which following a
successful first authentication, a second single
authentication method is displayed to challenge user in the
new single web page. The goal of two factor
authentication is to create a layered defense and make it
more difficult for an unauthorized person to access a
target
B. Problem Statements
While providing flexibility to the users, multi-modal
authentication can lead to some adverse effects:
1. Confusion and annoyance as unregistered
authentication methods are shown in front of user.
2. Undesirable friction in user experience which need
to perform an additional step to choose the
authentication method as others common
authentication system doesn’t behave the same.
)LJ/RJLQ2SWLRQVLQ0L8$3
Refer to Figure 2, the multi-modal authentication
system shows a list of login methods when user tries to
login their application. There have been pass experiences
where user forget the methods they registered on the
particular gateway. Hence, user has to spend some times
for the login process to recall their registered login
method and credential.
Accordingly, it would be desirable and convenient to
provide a system that can automatically select a login
method for a user based on the behavior characteristics of
a current session when compared to the user’s historical
profile.
III. RELATED WORK
A. The Environment
For the authentication platform system, it is supported
by a physical host with 8 mandatory Virtual Machines
(VM) with different functionality as shown in Figure 1.
For the physical host, it is using a 24-core CPU, 96B
RAM and 1.1TB disk storage. All the Virtual Machines
(VM) are deployed Ubuntu version 16.04LTS as the
operating system.
B. Collected Data Based on User Behavior
This paper is an industry case study of the development
on multiple authentication methods as an authentication
service for 16638 registered users. This case study is
unique because the data is extracted from a live
production system with registered users inside multiple
system logs. Since this paper emphasizes on user behavior
for multi-modal authentication, related analytic is
measured based on scenario of users performing
authentication to access the production secure portal. The
authentication system log contained the information such
as process time, authentication method selected,
application which to access, geolocation and user agent.
The log duration is 3 months, which is from July 2018 to
Sept 2018. As review purpose in this paper, 1 user who
named as User C is selected for the user behavior
analytics based on 100 successful access from
authentication logs last 3 months.
121
7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ%URZVHU
User Agent Selected Authentication Method
Password TCK OTP Token Certificate
Firefox 12 5 8 28
Internet Explorer 5 0 0 0
Chrome 31 9 2 0
Based on Table 1, User C prefers to use Firefox as default
browser with Certificate login method. Secondly is
Chrome, while prefer login method is password. It might
because the user certificate is stored under Firefox.
7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ$SSOLFDWLRQ
Application Selected Authentication Method
Password TCK OTP Token Certificate
Myprofile 27 0 0 3
MyEss 11 14 10 25
IDPAA 10 0 0 0
Table 2 shows that User C used to access MyEss
application most of the time with certificate login method.
Whereas, password is the prefer method of User C when
go to others application.
7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ/RFDWLRQ
Location Selected Authentication Method
Password TCK OTP Token Certificate
Geolocation 1 44 10 10 27
Geolocation 2 1 1 0 0
Geolocation 3 1 3 0 3
Geolocaion 1: Kuala Lumpur Geolocation 2: Petaling
Jaya
Geolocation 3: Seri Kembangan
Table 3 shows that User C normally access from
Geolocation 1 by using both favorite login method which
is password and certificate.
7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ7LPHVWDPS
Timestamp Selected Authentication Method
Password TCK OTP Token Certificate
Timestamp 1 23 7 4 19
Timestamp 2 17 4 6 8
Timestamp 3 3 3 0 6
Timestamp 4 0 0 0 0
Timestamp 1: 6am – 12pm Timestamp 2: 12pm – 6pm
Timestamp 3: 6pm – 12am Timestamp 4: 12am – 6am
Table 4 indicates that User C access application mostly on
Timestamp 1 with password login method follow by
certificate login method.
IV. SOLUTION
Figure 3 is a full diagram illustrating a representative
environment in which an automated method selection in a
multi-modal authentication system may be implemented.
)LJ3URSRVHG)UDPHZRUN'LDJUDPV
The paper’s idea discloses a computer-implemented
method to automatically select an authentication method
for a user based on a plurality of historical profiles
corresponding to user identifier in a multi-modal
authentication system. In another aspect, a protocol that
comparing behavioral characteristics of the user during
current session with the user behavioral profile that
previously developed based on prior usage patterns of the
user through the historical login session. User behavior
profile included device location, usual login timestamp,
internet service provider and application.
)LJ2YHUDOO3URFHVV)ORZ
Figure 4 is the overall process flow of the proposed
protocol in this paper. First, user comes to an
authentication gateway to login for an application. The
authentication system will ask the user to enter her/his
username first instead of show a list of login method to let
user select. After user enters their username, the system
only will start the enable the automated method selection
flow if the username is verified by the system. The
authentication system automatically selects a login method
for the user based on a plurality of historical profiles
related to his/her username inside the database. If the user
continues and completed login with the selected method,
the successful login attempt is added to the historical
profiles.
Alternatively, user may wish to skip the selected
method, at that moment, the automation authentication
system will evaluate the profile of user again by exclude
the skipped method as show in Figure 5.
122
)LJ3URFHVV)ORZZKHQXVHUVNLSSHGVHOHFWHGPHWKRG
In some scenarios, two or more methods may have the
same plurality of historical profiles; hence, the system will
pick the last used method from most recent login based on
the timestamp table which will explain more in the
following session.
Basically, the proposed process flow shows in Figure 3
depends on 2 modules as following:
1. 3URILOLQJ 0RGXOH, wherein processing the
behavioral data includes the user’s login sessions,
geolocation, and type of browser used to generate
a user profile
2. (YDOXDWLRQ0RGXOH, wherein evaluating the user’s
profile by factoring in environmental parameters
of the user terminal to select an authentication
method.
A. Profiling Module.
Profiling process extracts the data that is received,
stored and transmitted by authentication server after user is
verified. Successful login data are profiled based on the
environmental parameters, e.g. access application,
browser, and geolocation.
Table 5 shows the normalized distribution implemented
on a profile based on user agent from User C from Table 1.
Normalized distribution equation are obtained from below
based on password method in Firefox browser.
=
= 0.226
7DEOH1RUPDOL]HG'LVWULEXWLRQRI8VHUEDVHGRQEURZVHU
User Agent Selected Authentication Method
Password TCK OTP Token Certificate
Firefox 0.226 0.094 0.152 0.528
Internet Explorer 1 0 0 0
Chrome 0.738 0.214 0.048 0
On the other hand, the profiling module also stores the
timestamp table of each method for every successful login
attempt as illustrated in the table 6 below. It is stored to use
when system obtain more than one favorite method for
user after the evaluation module.
7DEOH/DVW6XFFHVVIXO/RJLQ7LPHVWDPSRIHDFKPHWKRG
3DVVZRUG 7. 2737RNHQ HUWLILFDWH
30/9/2018 12/9/2018 31/8/2018 29/9/2018
1.39pm 4.50pm 9.15am 10.02am
B. Evaluation Module
Automated authentication system based on user
behavior profile then the system analysis an overall
distribution for the current session user. After analysis the
highest normalized distribution, one of login method
appear which is based on user-defined preference
regarding their respective apparatus activities. For example
A, if User C in Seri Kembangan and wish to access
application MyEss by using Chrome browser on 1pm, the
overall distribution of each method, is calculated as
example equation below and tabulated in Table 8.
Overall distribution on Password Method
= 0.738x0.183x0.484x0.486 = 0.0318
7DEOH2YHUDOO'LVWULEXWLRQRIHDFK0HWKRGLQ([DPSOH$
Environmental
Parameters
Authentication Methods
Password TCK OTP Token Certificate
Chrome 0.738 0.214 0.048 0
MyEss 0.183 0.233 0.167 0.416
Geolocation 1 0.484 0.11 0.11 0.3
Timestamp 2 0.486 0.114 0.171 0.229
Overall
Distribution
0.0318 0.0006 0.0002 0
Based on table 7, Password method is selected for user
C to login as it has the highest normalized distribution
(HND) when user C having situation in Example A.
)LJ(YDOXDWLRQ3URFHVV)ORZZKHQVHOHFWHGPHWKRGLVVNLSSHG
Alternatively, for some scenario as shown in Figure 6,
if more than one method having same highest normalized
distribution (HND), the automated authentication system
will select the recent last use method based on the
timestamp table which stored during every successful login
attempt of the user in profiling module as shown in Table 6
and the overall distribution cannot equal to zero.
Otherwise, system will directly show the HND login
method only.
However, user is allowed to skip the selected method.
If user skips the selected method but the user only having
one login method, then system will show related error to
user. While if user has activated more than one login
method previously, the system will exclude the skipped
method and do evaluation again to select another login
method for user. Hence, if user do not skip the selected
method and continue login, the related environment data
will stored by the authentication server to keep as profiling
module.
As in Example A. if user C skipped the Password
Method, automated authentication system will select TCK
as next login method for User C as TCK method having
the latest login, while Password method is excluded and
overall distribution of certificate method is equal to zero.
Normalized Distribution of
Password login in Firefox
123
V. DISCUSSION
The aim of this paper is to attempt an intelligent
method which allows user the flexibility to select its own
preferable login method when access a restricted web
service [7].
From the finding in Table 1 to 4 shares that every
user have their own behavior when they access the
authentication system in different authentication factor
such as location, timing, application to access, user agent
and etc. These end-user behavior is credible data analytic
to mature one of the important research content for our
paper. The findings from Table 5 to 6 which involve the
normalized distribution formula indicate user C favorite
methods are password and certificate while depends on
which browser is using. For example, the system will
prompt user C certificate login method when user C
access service with Firefox browser. The results clearly
show that the automated authentication system able to
select user prefer login method in different scenarios
based on the two module which is profiling and evaluation
as shown in session IV.
VI. CONCLUSION
Clearly, the requirement for reliable techniques for user
authentication has enhanced within the wake of
heightened considerations regarding security and fast
advancements in communication, quality and networking
[8]. A large kind of applications need reliable verification
schemes to verify the identity of a person requesting their
service.
Current proposed protocol is to provide user login
method automatically based on user’s historical profile to
facilitate the multi-modal authentication process of a user.
At the same time, it able to proliferate the security level
which based on user historical behavior data. Firstly, the
authentication system automatically selects a login method
for the user based on a plurality of historical profiles
related to his/her username inside the database. If the user
continues and completed login with the selected method,
the successful login attempt is added to the historical
profiles.
As summary of the results we discussion in session V, it
indicates that the proposed approach is able to select login
method for user automatically based on their historical
behavior, it positively facilitates the undesirable friction in
user experience. The results also show that confusion and
annoyance will not occurred as unregistered authentication
methods are shown.
However, the automated authentication system do have
limitation especially for new user. It is because no
behavior data able to collect since the user is newly
registered. Hence, the automated authentication system
cannot proceed to evaluation module. Furthermore, the
current proposed protocol is based on the user historical
behavior from first day register, so it may not precise for
users that change their recent behavior which possible
caused by many environment factor such as change laptop,
work relocation and etc.
For future work, we are planning to deploy the proposed
protocol in this paper, along with its implementation and
experimentation in real testbeds. Correspondingly, the
team will study to design a better approach for increasing
the design complexity and overcome the limitations but at
the same time, remains improving the end-user experience.
Conclusively, when this application is fully deployed,
the intelligent protocol will be able to prompt user favor
login method based on their historical behavior. This will
save time for user while still able provide positive
identification, also, the multi-modal authentication system
will serve as a data repository for evaluating the user
historical behavior.
ACKNOWLEDGMENT
We acknowledge the support provided by Dr Cheong
Hoon Sin for providing the advice on the idea and
framework related of this paper. Also, Mr. Wong Hon
Loon to provide the authentication logs from the
production platform as reference on user behavior analytics
to accomplish this paper.
REFERENCES
[1] Chengyuan Zhang, Haishui Xu, “Research on user behavior
authentication model based on stochastic Petri nets”, Proceeding of
the American Institute of Physics
[2] Garg, Suneet  vig Savita gupta, Renu, “Multimodal
Authentication System: An Overview”, International Journal of
Control Theory and Applications, Vol 10, Page 111 to 119, 2017
https://www.researchgate.net/publication/319292208_Multimodal_
Authentication_System_An_Overview
[3] Sea Chong Seak, Ng Kang Siong, Wong Hon Loon, Galoh
Rashidah Haron, “A Centralized Multimodal Unified
Authentication Platform for Web-based Application”, WCECS
2014, Proceedings of the World Congress on Engineering and
Computer Science
[4] Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat
Nen, Nor Izyani Daud, “User Behaviour and Interactions for
Multimodal Authentication”, PST2016, published by IEEE.
[5] Margaret Rouse, “Multifactor authentication (MFA)”, March 2015,
https://searchsecurity.techtarget.com/definition/multifactor-
authentication-MFA
[6] Sea ChongSeak, Chang PeiShan, Wong HonLoon, Dahlia Din,
“Research Institution Software Development Process Improvement
to Produce High Quality Research Software  Assessment on
Technical Software Package Installation”, ISAI2018, published by
IOP
[7] Anusiuba Ifeanyi, Anigbogu S.O., Onyesolu Moses, Okonkwo,
“Multimodal Authentication Techniques For Staff Identification
And Tracking”, December 2014, proceeding of West African
Journal of Industrial  Academic Research.
[8] Stacy Lyn Stubblefield, “System and method for utilizing
behavioral characteristics in authentication and fraud prevention”,
15 March 2013, US9275211 B2
[9] David M. Grigg, Peter John Bertanzetti, Michael E. Toth, Carrie
Anne Hanson, “User authentication based on historical user
behavior”, 7 Feb 2014, US9185101 B2
[10] Zhengyou Zhang, David W.Williams, Yuan Kong, Zicheng Liu,
David Kurlander, Mike Sinclair, “Multimodal authentication”, 29
June 2005, US8079079B
124

More Related Content

What's hot

Website vulnerability to session fixation attacks
Website vulnerability to session fixation attacksWebsite vulnerability to session fixation attacks
Website vulnerability to session fixation attacks
Alexander Decker
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
KeatonJennings91
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
RoelofMerwe139
 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
McdonaldRyan37
 
Cis 349 Inspiring Innovation--tutorialrank.com
Cis 349  Inspiring Innovation--tutorialrank.comCis 349  Inspiring Innovation--tutorialrank.com
Cis 349 Inspiring Innovation--tutorialrank.com
PrescottLunt371
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
jonhson185
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
Soaps82
 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.com
robertleses8
 
Cis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comCis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.com
jhonklinz9
 
CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com
donaldzs55
 
Cis 349 Education Specialist-snaptutorial.com
Cis 349 Education Specialist-snaptutorial.comCis 349 Education Specialist-snaptutorial.com
Cis 349 Education Specialist-snaptutorial.com
robertlesew95
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
International Center for Biometric Research
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
bellflower46
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
TELKOMNIKA JOURNAL
 
Passport status tracking system (1)
Passport status tracking system (1)Passport status tracking system (1)
Passport status tracking system (1)
SUVITHAS2
 

What's hot (16)

Website vulnerability to session fixation attacks
Website vulnerability to session fixation attacksWebsite vulnerability to session fixation attacks
Website vulnerability to session fixation attacks
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
 
Cis 349 Inspiring Innovation--tutorialrank.com
Cis 349  Inspiring Innovation--tutorialrank.comCis 349  Inspiring Innovation--tutorialrank.com
Cis 349 Inspiring Innovation--tutorialrank.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.com
 
Cis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comCis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.com
 
CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com
 
Cis 349 Education Specialist-snaptutorial.com
Cis 349 Education Specialist-snaptutorial.comCis 349 Education Specialist-snaptutorial.com
Cis 349 Education Specialist-snaptutorial.com
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
Passport status tracking system (1)
Passport status tracking system (1)Passport status tracking system (1)
Passport status tracking system (1)
 

Similar to Automated login method selection in a multi modal authentication - login method selection based on user behavior

Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
eSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
eSAT Publishing House
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
1crore projects
 
J017325660
J017325660J017325660
J017325660
IOSR Journals
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
IJNSA Journal
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240
Sakshi Jain
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
IJNSA Journal
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
Ouzza Brahim
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
Kamal Acharya
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
IJNSA Journal
 
main project doument
main project doumentmain project doument
main project doument
Sunil Kotthakota
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ijistjournal
 

Similar to Automated login method selection in a multi modal authentication - login method selection based on user behavior (20)

Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
 
main project doument
main project doumentmain project doument
main project doument
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
 

More from Conference Papers

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
Conference Papers
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
Conference Papers
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Conference Papers
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
Conference Papers
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Conference Papers
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Conference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
Conference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
Conference Papers
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
Conference Papers
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
Conference Papers
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
Conference Papers
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysia
Conference Papers
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
Conference Papers
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
Conference Papers
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
Conference Papers
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistor
Conference Papers
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
Conference Papers
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edge
Conference Papers
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
Conference Papers
 

More from Conference Papers (20)

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysia
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistor
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edge
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Automated login method selection in a multi modal authentication - login method selection based on user behavior

  • 1. Automated Login Method Selection in a Multi- modal Authentication System Login Method Selection based on User Behavior CHANG PEI SHAN Security Information Lab Mimos Berhad Kuala Lumpur, Malaysia ps.chang@mimos.my DAHLIA DIN Security Information Lab Mimos Berhad Kuala Lumpur, Malaysia dahlia.din@mimos.my WONG HON LOON Security Information Lab Mimos Berhad Kuala Lumpur, Malaysia hl.wong@mimos.my SEA CHONG SEAK Security Information Lab Mimos Berhad Kuala Lumpur, Malaysia cssea@mimos.my LEE KAY WIN Security Information Lab Mimos Berhad Kuala Lumpur, Malaysia kw.lee@mimos.my Abstract² $Q LQWHOOLJHQW PRGHO LV SURSRVHG WR DXWRPDWHVHOHFWLRQRIORJLQDXWKHQWLFDWLRQPHWKRGLQD PXOWLPRGHO DXWKHQWLFDWLRQ VVWHP EDVHG RQ XVHU EHKDYLRU SURILOH 7KH SURSRVHG SURWRFRO DQDO]HV WKH XVHUEHKDYLRUGDWDWRPLQLPL]HWKHSURFHVVLQUHDOWLPH DQGSUHYHQWXQWUXVWHGDWWHPSW PHDQZKLOHLWDEOHWR IDFLOLWDWHIULFWLRQOHVVXVHUH[SHULHQFHLQDPXOWLPRGDO DXWKHQWLFDWLRQ VVWHP 7KH SURSRVHG VVWHP GHWHUPLQHV D XVHU DW D ORJLQ LQWHUIDFH DQG UHWULHYHV WKHXVHU¶VEHKDYLRUDOKLVWRULFDOGDWDDVLWVGHWHUPLQDQW IDFWRUV PDWFKLQJ XVHU EHKDYLRU EDVHG RQ GDWD UHWULHYDOIURPGDWDEDVH:KHUHLQWKHEHKDYLRUDOGDWD LQFOXGHV WKH XVHU¶V ORJLQ VHVVLRQV WLPH JHRORFDWLRQ DFFHVVHGDSSOLFDWLRQDQGWSHRIXVHUDJHQWXVHG7KH VVWHPSURFHVVHVWKHEHKDYLRUDOGDWDWRJHQHUDWHDXVHU SURILOHEDSURILOLQJPRGXOHDWWKDWSRLQWHYDOXDWHV WKH XVHU¶V SURILOH E IDFWRULQJ LQ HQYLURQPHQWDO SDUDPHWHUV RI WKH XVHU WHUPLQDO WR VHOHFW DQ DXWKHQWLFDWLRQPHWKRGEDQHYDOXDWLRQPRGXOH7KH VHOHFWHG DXWKHQWLFDWLRQ PHWKRG ZLOO EH GLVSODHG IRU WKHXVHUWRFRPSOHWHWKHDXWKHQWLFDWLRQSURFHVV2QWKH RWKHU KDQG WKH VVWHP ZLOO XSGDWLQJ WKH XVHU SURILOH ZLWKGDWDUHODWLQJWRDQHZVXFFHVVIXOORJLQVHVVLRQIRU IXWXUHHYDOXDWLRQ Keywords - Automated Method Selection, Multi- modal Authentication system, User Historical Profile, Profiling Module, Environmental Parameters, Evaluation Module, Normalized Distribution I. INTRODUCTION In the past couple of years, we have witnessed the rapid development of technology especially on cloud and network computing and it has significant impact on the world today. Users enjoy the technology to reduce the operating time, improve operation efficiency and other convenience by registered and stored all their confidential personal data in cloud application or others web-based programs. Unfortunately, the vast majority of network attacks are initiated, the cloud terminal of the weight loss caused by the end user security environment weakened, the client is more susceptible to viruses and Trojans infected, the user password is stolen incident has increased, all of this lead to face with more severe information security challenges [1]. Hence, the user authentication is essential requirement for current protected web-based applications nowadays. The common ways of authentication is through passwords (knowledge-based security), fingerprint or face (inherence factors) and ID cards (token based security) which are normally accustomed limit access to a variety of systems [2]. Initially, a traditional authentication mechanism provides a sole authentication method for user to proceed in a secure web page access. However, current development in information technology manages to decouple authentication function from application, thus allowing for new possibilities for the application to counter the internet fraud in a more cost effective way [3]. In this case, the traditional identity authentication and content authentication cannot meet the basic security needs of the web-based application and cloud computing environment [4]. Therefore, multifactor authentication is required which is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction [5]. Then again, to let user must aware and able to provide “what the user has” and “what the user knows”, a multi- modal authentication system called MIMOS Unified Authentication Platform (Mi-UAP) is being introduced by author’s team member. Multi-modal means, multiple authentication methods are provided for user to access a web application. Stand arise this multi-model authentication system, user able to select a login option they confident to provide for the current situation for completing a successful authentication. Furthermore, the current development phase is to generate an automated selection of login method for user in a multi-modal authentication system for facilitating frictionless and improve user experience. The rest of the paper is organized and structured as follows. In Section II, we look into the background of our authentication system Mi-UAP platform. We define the related work by introduce the experimental environment and user historical data analysis from our production in Session III. For session IV, we introduce solution by describe the architecture and flow of our design idea, as 120 978-1-5386-8546-4/19/$31.00 ©2019 IEEE
  • 2. well as the analysis results based on collected historical data. In Section V, we include the major findings relate to the analysis we have done. Finally, we describe the benefits and limitations of the proposed protocol, also the future work in the conclusion section. II. BACKGROUND A. Platform Architecture The organization Information System Security research lab has developed a multi-modal authentication platform named Mi-UAP to provide a convenient and user-friendly service for both organizations and individual users [6]. Mi-UAP provides an infrastructure which able deliver authentication services to applications with the authentication mechanism decoupled from application implementation. This is a self-managed system which incurs zero administrative effort [3]. Besides, a user has an option to use any login method based on user’s preference as six authentication login options is available for users to select. The authentication method implemented in our platform depicted in Figure 1 includes four common authentication methods used today which is password, certificate, One Time Password (OTP) token and OTP SMS; and other two proprietary authentication methods was introduce and developed by the authors which is Time-Constrained Key (TCK) and 2DBarcode. The development and production spanned for eight years. The authentication methods are progressively added, case by case basis, either as new project requirements or to solve problems raised from previous authentication method [4]. )LJ0L8$33ODWIRUP$UFKLWHFWXUH The benefits of the authentication platform utilizes Single Sign-On (SSO) for a seamless environment operation and adaptive authentication with threat response without modifying existing applications [6]. Mi-UAP also able support two factors authentication, which following a successful first authentication, a second single authentication method is displayed to challenge user in the new single web page. The goal of two factor authentication is to create a layered defense and make it more difficult for an unauthorized person to access a target B. Problem Statements While providing flexibility to the users, multi-modal authentication can lead to some adverse effects: 1. Confusion and annoyance as unregistered authentication methods are shown in front of user. 2. Undesirable friction in user experience which need to perform an additional step to choose the authentication method as others common authentication system doesn’t behave the same. )LJ/RJLQ2SWLRQVLQ0L8$3 Refer to Figure 2, the multi-modal authentication system shows a list of login methods when user tries to login their application. There have been pass experiences where user forget the methods they registered on the particular gateway. Hence, user has to spend some times for the login process to recall their registered login method and credential. Accordingly, it would be desirable and convenient to provide a system that can automatically select a login method for a user based on the behavior characteristics of a current session when compared to the user’s historical profile. III. RELATED WORK A. The Environment For the authentication platform system, it is supported by a physical host with 8 mandatory Virtual Machines (VM) with different functionality as shown in Figure 1. For the physical host, it is using a 24-core CPU, 96B RAM and 1.1TB disk storage. All the Virtual Machines (VM) are deployed Ubuntu version 16.04LTS as the operating system. B. Collected Data Based on User Behavior This paper is an industry case study of the development on multiple authentication methods as an authentication service for 16638 registered users. This case study is unique because the data is extracted from a live production system with registered users inside multiple system logs. Since this paper emphasizes on user behavior for multi-modal authentication, related analytic is measured based on scenario of users performing authentication to access the production secure portal. The authentication system log contained the information such as process time, authentication method selected, application which to access, geolocation and user agent. The log duration is 3 months, which is from July 2018 to Sept 2018. As review purpose in this paper, 1 user who named as User C is selected for the user behavior analytics based on 100 successful access from authentication logs last 3 months. 121
  • 3. 7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ%URZVHU User Agent Selected Authentication Method Password TCK OTP Token Certificate Firefox 12 5 8 28 Internet Explorer 5 0 0 0 Chrome 31 9 2 0 Based on Table 1, User C prefers to use Firefox as default browser with Certificate login method. Secondly is Chrome, while prefer login method is password. It might because the user certificate is stored under Firefox. 7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ$SSOLFDWLRQ Application Selected Authentication Method Password TCK OTP Token Certificate Myprofile 27 0 0 3 MyEss 11 14 10 25 IDPAA 10 0 0 0 Table 2 shows that User C used to access MyEss application most of the time with certificate login method. Whereas, password is the prefer method of User C when go to others application. 7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ/RFDWLRQ Location Selected Authentication Method Password TCK OTP Token Certificate Geolocation 1 44 10 10 27 Geolocation 2 1 1 0 0 Geolocation 3 1 3 0 3 Geolocaion 1: Kuala Lumpur Geolocation 2: Petaling Jaya Geolocation 3: Seri Kembangan Table 3 shows that User C normally access from Geolocation 1 by using both favorite login method which is password and certificate. 7DEOH8VHU3UHIHUHQFH0HWKRGEDVHGRQ7LPHVWDPS Timestamp Selected Authentication Method Password TCK OTP Token Certificate Timestamp 1 23 7 4 19 Timestamp 2 17 4 6 8 Timestamp 3 3 3 0 6 Timestamp 4 0 0 0 0 Timestamp 1: 6am – 12pm Timestamp 2: 12pm – 6pm Timestamp 3: 6pm – 12am Timestamp 4: 12am – 6am Table 4 indicates that User C access application mostly on Timestamp 1 with password login method follow by certificate login method. IV. SOLUTION Figure 3 is a full diagram illustrating a representative environment in which an automated method selection in a multi-modal authentication system may be implemented. )LJ3URSRVHG)UDPHZRUN'LDJUDPV The paper’s idea discloses a computer-implemented method to automatically select an authentication method for a user based on a plurality of historical profiles corresponding to user identifier in a multi-modal authentication system. In another aspect, a protocol that comparing behavioral characteristics of the user during current session with the user behavioral profile that previously developed based on prior usage patterns of the user through the historical login session. User behavior profile included device location, usual login timestamp, internet service provider and application. )LJ2YHUDOO3URFHVV)ORZ Figure 4 is the overall process flow of the proposed protocol in this paper. First, user comes to an authentication gateway to login for an application. The authentication system will ask the user to enter her/his username first instead of show a list of login method to let user select. After user enters their username, the system only will start the enable the automated method selection flow if the username is verified by the system. The authentication system automatically selects a login method for the user based on a plurality of historical profiles related to his/her username inside the database. If the user continues and completed login with the selected method, the successful login attempt is added to the historical profiles. Alternatively, user may wish to skip the selected method, at that moment, the automation authentication system will evaluate the profile of user again by exclude the skipped method as show in Figure 5. 122
  • 4. )LJ3URFHVV)ORZZKHQXVHUVNLSSHGVHOHFWHGPHWKRG In some scenarios, two or more methods may have the same plurality of historical profiles; hence, the system will pick the last used method from most recent login based on the timestamp table which will explain more in the following session. Basically, the proposed process flow shows in Figure 3 depends on 2 modules as following: 1. 3URILOLQJ 0RGXOH, wherein processing the behavioral data includes the user’s login sessions, geolocation, and type of browser used to generate a user profile 2. (YDOXDWLRQ0RGXOH, wherein evaluating the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method. A. Profiling Module. Profiling process extracts the data that is received, stored and transmitted by authentication server after user is verified. Successful login data are profiled based on the environmental parameters, e.g. access application, browser, and geolocation. Table 5 shows the normalized distribution implemented on a profile based on user agent from User C from Table 1. Normalized distribution equation are obtained from below based on password method in Firefox browser. = = 0.226 7DEOH1RUPDOL]HG'LVWULEXWLRQRI8VHUEDVHGRQEURZVHU User Agent Selected Authentication Method Password TCK OTP Token Certificate Firefox 0.226 0.094 0.152 0.528 Internet Explorer 1 0 0 0 Chrome 0.738 0.214 0.048 0 On the other hand, the profiling module also stores the timestamp table of each method for every successful login attempt as illustrated in the table 6 below. It is stored to use when system obtain more than one favorite method for user after the evaluation module. 7DEOH/DVW6XFFHVVIXO/RJLQ7LPHVWDPSRIHDFKPHWKRG 3DVVZRUG 7. 2737RNHQ HUWLILFDWH 30/9/2018 12/9/2018 31/8/2018 29/9/2018 1.39pm 4.50pm 9.15am 10.02am B. Evaluation Module Automated authentication system based on user behavior profile then the system analysis an overall distribution for the current session user. After analysis the highest normalized distribution, one of login method appear which is based on user-defined preference regarding their respective apparatus activities. For example A, if User C in Seri Kembangan and wish to access application MyEss by using Chrome browser on 1pm, the overall distribution of each method, is calculated as example equation below and tabulated in Table 8. Overall distribution on Password Method = 0.738x0.183x0.484x0.486 = 0.0318 7DEOH2YHUDOO'LVWULEXWLRQRIHDFK0HWKRGLQ([DPSOH$ Environmental Parameters Authentication Methods Password TCK OTP Token Certificate Chrome 0.738 0.214 0.048 0 MyEss 0.183 0.233 0.167 0.416 Geolocation 1 0.484 0.11 0.11 0.3 Timestamp 2 0.486 0.114 0.171 0.229 Overall Distribution 0.0318 0.0006 0.0002 0 Based on table 7, Password method is selected for user C to login as it has the highest normalized distribution (HND) when user C having situation in Example A. )LJ(YDOXDWLRQ3URFHVV)ORZZKHQVHOHFWHGPHWKRGLVVNLSSHG Alternatively, for some scenario as shown in Figure 6, if more than one method having same highest normalized distribution (HND), the automated authentication system will select the recent last use method based on the timestamp table which stored during every successful login attempt of the user in profiling module as shown in Table 6 and the overall distribution cannot equal to zero. Otherwise, system will directly show the HND login method only. However, user is allowed to skip the selected method. If user skips the selected method but the user only having one login method, then system will show related error to user. While if user has activated more than one login method previously, the system will exclude the skipped method and do evaluation again to select another login method for user. Hence, if user do not skip the selected method and continue login, the related environment data will stored by the authentication server to keep as profiling module. As in Example A. if user C skipped the Password Method, automated authentication system will select TCK as next login method for User C as TCK method having the latest login, while Password method is excluded and overall distribution of certificate method is equal to zero. Normalized Distribution of Password login in Firefox 123
  • 5. V. DISCUSSION The aim of this paper is to attempt an intelligent method which allows user the flexibility to select its own preferable login method when access a restricted web service [7]. From the finding in Table 1 to 4 shares that every user have their own behavior when they access the authentication system in different authentication factor such as location, timing, application to access, user agent and etc. These end-user behavior is credible data analytic to mature one of the important research content for our paper. The findings from Table 5 to 6 which involve the normalized distribution formula indicate user C favorite methods are password and certificate while depends on which browser is using. For example, the system will prompt user C certificate login method when user C access service with Firefox browser. The results clearly show that the automated authentication system able to select user prefer login method in different scenarios based on the two module which is profiling and evaluation as shown in session IV. VI. CONCLUSION Clearly, the requirement for reliable techniques for user authentication has enhanced within the wake of heightened considerations regarding security and fast advancements in communication, quality and networking [8]. A large kind of applications need reliable verification schemes to verify the identity of a person requesting their service. Current proposed protocol is to provide user login method automatically based on user’s historical profile to facilitate the multi-modal authentication process of a user. At the same time, it able to proliferate the security level which based on user historical behavior data. Firstly, the authentication system automatically selects a login method for the user based on a plurality of historical profiles related to his/her username inside the database. If the user continues and completed login with the selected method, the successful login attempt is added to the historical profiles. As summary of the results we discussion in session V, it indicates that the proposed approach is able to select login method for user automatically based on their historical behavior, it positively facilitates the undesirable friction in user experience. The results also show that confusion and annoyance will not occurred as unregistered authentication methods are shown. However, the automated authentication system do have limitation especially for new user. It is because no behavior data able to collect since the user is newly registered. Hence, the automated authentication system cannot proceed to evaluation module. Furthermore, the current proposed protocol is based on the user historical behavior from first day register, so it may not precise for users that change their recent behavior which possible caused by many environment factor such as change laptop, work relocation and etc. For future work, we are planning to deploy the proposed protocol in this paper, along with its implementation and experimentation in real testbeds. Correspondingly, the team will study to design a better approach for increasing the design complexity and overcome the limitations but at the same time, remains improving the end-user experience. Conclusively, when this application is fully deployed, the intelligent protocol will be able to prompt user favor login method based on their historical behavior. This will save time for user while still able provide positive identification, also, the multi-modal authentication system will serve as a data repository for evaluating the user historical behavior. ACKNOWLEDGMENT We acknowledge the support provided by Dr Cheong Hoon Sin for providing the advice on the idea and framework related of this paper. Also, Mr. Wong Hon Loon to provide the authentication logs from the production platform as reference on user behavior analytics to accomplish this paper. REFERENCES [1] Chengyuan Zhang, Haishui Xu, “Research on user behavior authentication model based on stochastic Petri nets”, Proceeding of the American Institute of Physics [2] Garg, Suneet vig Savita gupta, Renu, “Multimodal Authentication System: An Overview”, International Journal of Control Theory and Applications, Vol 10, Page 111 to 119, 2017 https://www.researchgate.net/publication/319292208_Multimodal_ Authentication_System_An_Overview [3] Sea Chong Seak, Ng Kang Siong, Wong Hon Loon, Galoh Rashidah Haron, “A Centralized Multimodal Unified Authentication Platform for Web-based Application”, WCECS 2014, Proceedings of the World Congress on Engineering and Computer Science [4] Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud, “User Behaviour and Interactions for Multimodal Authentication”, PST2016, published by IEEE. [5] Margaret Rouse, “Multifactor authentication (MFA)”, March 2015, https://searchsecurity.techtarget.com/definition/multifactor- authentication-MFA [6] Sea ChongSeak, Chang PeiShan, Wong HonLoon, Dahlia Din, “Research Institution Software Development Process Improvement to Produce High Quality Research Software Assessment on Technical Software Package Installation”, ISAI2018, published by IOP [7] Anusiuba Ifeanyi, Anigbogu S.O., Onyesolu Moses, Okonkwo, “Multimodal Authentication Techniques For Staff Identification And Tracking”, December 2014, proceeding of West African Journal of Industrial Academic Research. [8] Stacy Lyn Stubblefield, “System and method for utilizing behavioral characteristics in authentication and fraud prevention”, 15 March 2013, US9275211 B2 [9] David M. Grigg, Peter John Bertanzetti, Michael E. Toth, Carrie Anne Hanson, “User authentication based on historical user behavior”, 7 Feb 2014, US9185101 B2 [10] Zhengyou Zhang, David W.Williams, Yuan Kong, Zicheng Liu, David Kurlander, Mike Sinclair, “Multimodal authentication”, 29 June 2005, US8079079B 124