{"id":3094,"date":"2022-04-12T16:23:13","date_gmt":"2022-04-12T22:23:13","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=3094"},"modified":"2022-04-12T16:23:17","modified_gmt":"2022-04-12T22:23:17","slug":"adaptive-authentication-benefits-and-opportunities-in-security","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/04\/12\/adaptive-authentication-benefits-and-opportunities-in-security\/","title":{"rendered":"Adaptive Authentication: Benefits and Opportunities in Security"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/identitymanagementinstitute.org\/app\/uploads\/2020\/01\/adaptive-authentication.png\" alt=\"Adaptive Authentication for Modern Identity Management - Identity  Management Institute\u00ae\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n\n\n\n<p>Security has become a crucial part of the digital era and organizations are moving towards advanced techniques to keep their networks secure from malicious threats. With new advancements in security technology, there is always a level of uncertainty about its efficacy and whether there exist loopholes in its design for exploitation. Authentication mechanisms using single or multiple factors, such as password protection, certificate validation, and bio metrics, are still vulnerable when they are static. Contextual knowledge, an essential aspect of adaptive authentication, plays a key role to dynamically validate users while minimizing risk in real time. In this way, adaptive authentication is an ideal solution for modern network security. Although many organizations are quite skeptical about this innovative technology, numerous examples, theoretical systems, industrial systems, and academic surveys shed light on the benefits of adaptive authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Adaptive Authentication?<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/rublon.com\/wp-content\/uploads\/2021\/07\/adaptivebobalice.png\" alt=\"What is Adaptive Authentication? - Rublon\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n\n\n\n<p>Adaptive authentication is a form of multi-factor authentication wherein it selects only a specific set of authentication factors based on user profiles that depend on several contextual aspects, such as Geo location, proximity to devices, and bio metrics. To achieve this, adaptive authentication deploys an ML (machine learning) algorithm to maintain and dynamically update these authentication factors based on predefined criteria and real time information during each interaction with the user. Such information used may include history of authentication, access failure\/success rate, the device used to access, and more.<\/p>\n\n\n\n<p>On a broad level, authentication factors can be categorized into three areas: knowledge-based, location-based, and <a>behavior<\/a>-based. Knowledge-based factors include methods such as user passwords and pins; location-based factors may include the Geo-location of the user; and <a>behavior<\/a>-based factors can include using sensors for bio metrics, such as touch id and a retinal scan, and subjective information like patterns of device usage. On the other hand, single factor authentication, although faster, does not provide the highest security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Adapting to Adaptive Authentication<\/h2>\n\n\n\n<p>Many companies are hesitant to adopt adaptive authentication in <a>favor<\/a> of a fixed security mechanism that provides transparency for monitoring and evaluation. However, these traditional security mechanisms can be exploited when sensitive information is leaked, such as passwords, key pins, and key cards. Adaptive authentication can ensure more reliability as it strategize responses based on an estimated risk derived from user profiles and maintains risk scores from user transactions over time. An entity is deemed risky when abnormalities begin to emerge in authentication; an adaptive authentication model would select the most suitable factors for assessment and can deny access due to these abnormalities. Based on context and requirements, they can be classified as,<\/p>\n\n\n\n<p><strong>Trust-Based Authentication<\/strong>: To overcome the contradiction between privacy and security by enabling trust with selective authentication schemes to prevent sensitive data leakage.<\/p>\n\n\n\n<p><strong>Risk-Based Authentication<\/strong>: To identify the threat before performing evaluation which ensures reliability and effectiveness.<\/p>\n\n\n\n<p><strong>Context-Based Continuous Authentication<\/strong>: Contextual verification of users throughout sessions by monitoring for service usage behavior even after initial authentication.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/www.tokenguard.com\/images\/Fraud-Prevention\/Adaptive-Authentication-Diagram.png\" alt=\"RSA Adaptive Authentication | TokenGuard.com\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Industrial Applications<\/h2>\n\n\n\n<p>Although there are challenges and uncertainties with theoretical proposals and prototypes, there are companies who are currently implementing adaptive authentication for their products with more adaptive authentication technologies to be released in the near future. As the value for security keeps increasing, organizations are moving towards AI solutions and dynamic security protocols.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Silent Authentication for e-Commerce<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Silent authentication: continuous, and unobtrusive for a fluid customer experience\" width=\"640\" height=\"360\" data-src=\"https:\/\/www.youtube.com\/embed\/FQAOzTykfGw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The French multinational company Thales, which provides technical services for the aerospace industry, has recently announced a product that uses silent authentication for e-commerce delivery via drones. The company aims to achieve continuous authentication in real time with a seamless experience using the way phones are used, user location, gait (a person\u2019s manner of walking), patterns of actions, and surrounding signals. They aim to achieve,<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Trusted connected objects such as mobile becoming the main form for ID<\/li><li>Seamless user experience (e.g., if a phone is forgotten at home, there is a temporary device at the office with transferred updated personal phone data)<\/li><li>Personalized experience (e.g., automatic lighting based on mood)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Adaptive Verification Based on Risk<\/strong><\/h3>\n\n\n\n<p>IBM Security Verify Adaptive Access is a system that helps organizations with secure verification by balancing risk considerations with user experience. A risk calculation engine (IBM <a>Trusteer<\/a>) developed by IBM is used to assess user profiles throughout digital interactions to provide risk-based policy editor, protect SAAS, analyze threat intelligence, detect suspicious user behavior, assess device hygiene (for malware\/viruses) and behavioral bio metric abnormalities. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits<\/h2>\n\n\n\n<p>Adaptive authentication leverages three primary concepts:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Contextual knowledge<\/li><li>Real-time threat analysis<\/li><li>Continuous assessment for adaption after authentication<\/li><\/ul>\n\n\n\n<p>All three notions play a significant role in modern security. With advancements in technology, we now have the means to analyze a variety of data sources through modern sensors along with the computational capability through AI while enabling trust-based security to enhance non-intrusiveness into personal data. <\/p>\n\n\n\n<p>Usability is another aspect to consider in terms of business platforms. User experiences can be improved with personalized accessibility features that do not tire the customers with lengthy authorization protocols while also increasing performance. The environment also plays a key role in determining security processes as certain domains like the medical industry and transportation industry are time sensitive and serious. Finally, continuous monitoring ensures hackers and imposters who may duplicate actual user identities to pass initial authentication, are captured through behavioral analysis during communication with the network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Opportunities<\/h2>\n\n\n\n<p>It is important to note that AI is becoming ever more prominent in computer science and security fields. It is certainly plausible that AI will become incredibly influential in network security as well. From a business perspective, it is becoming more prudent to venture into adaptive authentication technologies as early as possible to gain a market advantage over competitors in strategy and revenue.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/www.onespan.com\/sites\/newco\/files\/inline-images\/Updated-Image.png\" alt=\"Adaptive Authentication Survey Results\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n\n\n\n<p>Companies already have the physical means and processes that are needed to be brought together to achieve the successful implementation of adaptive authentication techniques. An ISMG (Information Security Media Group) survey in 2019 indicated that adaptive authentication topped the list of authentication investments. The survey also highlighted that only 10% of all financial institutions showed confidence in their security features as 96% of them still use legacy systems. Moreover, 37% percent of these financial institutions have an active initiative that is working towards these technologies. Hence, adaptive authentication is going to be a game changer for organizations needing strong defense to guard customer and enterprise data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p><a href=\"https:\/\/lpasquale.github.io\/papers\/ACSOS2021.pdf\">https:\/\/lpasquale.github.io\/papers\/ACSOS2021.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.onelogin.com\/resource-center\/infographics\/future-authentication\">https:\/\/www.onelogin.com\/resource-center\/infographics\/future-authentication<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/mobile\/inspired\/passive-behavioral-biometrics\">https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/mobile\/inspired\/passive-behavioral-biometrics<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/docs\/en\/security-verify?topic=access-overview\">https:\/\/www.ibm.com\/docs\/en\/security-verify?topic=access-overview<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/products\/risk-based-authentication-solution\">https:\/\/www.ibm.com\/products\/risk-based-authentication-solution<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.onespan.com\/blog\/ismg-survey-adaptive-authentication-tops-list-authentication-investments-2019\">https:\/\/www.onespan.com\/blog\/ismg-survey-adaptive-authentication-tops-list-authentication-investments-2019<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security has become a crucial part of the digital era and organizations are moving towards advanced techniques to keep their networks secure from malicious threats. With new advancements in security technology, there is always a level of uncertainty about its efficacy and whether there exist loopholes in its design for exploitation. Authentication mechanisms using single &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/04\/12\/adaptive-authentication-benefits-and-opportunities-in-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Adaptive Authentication: Benefits and Opportunities in Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":435,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-3094","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Rahul Ravi","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/rahul-ravi\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/3094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/435"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=3094"}],"version-history":[{"count":7,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/3094\/revisions"}],"predecessor-version":[{"id":3104,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/3094\/revisions\/3104"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=3094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=3094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=3094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}