Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
- URL: http://arxiv.org/abs/2403.11798v1
- Date: Mon, 18 Mar 2024 13:55:24 GMT
- Title: Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
- Authors: Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono,
- Abstract summary: Risk-based authentication (RBA) is used to protect user accounts from unauthorized takeover.
Recent attacks have revealed vulnerabilities in other parts of the authentication process, specifically in the account recovery function.
This paper presents the first study to investigate risk-based account recovery (RBAR) in the wild.
- Score: 1.776750337181166
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Risk-based authentication (RBA) is used in online services to protect user accounts from unauthorized takeover. RBA commonly uses contextual features that indicate a suspicious login attempt when the characteristic attributes of the login context deviate from known and thus expected values. Previous research on RBA and anomaly detection in authentication has mainly focused on the login process. However, recent attacks have revealed vulnerabilities in other parts of the authentication process, specifically in the account recovery function. Consequently, to ensure comprehensive authentication security, the use of anomaly detection in the context of account recovery must also be investigated. This paper presents the first study to investigate risk-based account recovery (RBAR) in the wild. We analyzed the adoption of RBAR by five prominent online services (that are known to use RBA). Our findings confirm the use of RBAR at Google, LinkedIn, and Amazon. Furthermore, we provide insights into the different RBAR mechanisms of these services and explore the impact of multi-factor authentication on them. Based on our findings, we create a first maturity model for RBAR challenges. The goal of our work is to help developers, administrators, and policy-makers gain an initial understanding of RBAR and to encourage further research in this direction.
Related papers
- "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models [74.05368440735468]
Retrieval-Augmented Generative (RAG) models enhance Large Language Models (LLMs)
In this paper, we demonstrate a security threat where adversaries can exploit the openness of these knowledge bases.
arXiv Detail & Related papers (2024-06-26T05:36:23Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts [0.0]
This paper presents a study on the account settings of Google and Apple users.
Considering the multi-factor authentication configuration and recovery options, we analyzed the account security and lock-out risks.
Our results provide insights into the usage of multi-factor authentication in practice, show significant security differences between Google and Apple accounts, and reveal that many users would miss access to their accounts when losing a single authentication device.
arXiv Detail & Related papers (2024-03-22T10:05:37Z) - Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication [0.44998333629984877]
We present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML)
Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator ( RSSI) values from Wi-Fi Access Points (APs)
For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access.
arXiv Detail & Related papers (2024-01-12T14:58:15Z) - Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins [0.0]
Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen or otherwise guessed passwords.
RBA monitors different features, such as geolocation and device during login.
Only a few online services publish information about how their systems work.
arXiv Detail & Related papers (2023-08-29T09:37:14Z) - Measuring Re-identification Risk [72.6715574626418]
We present a new theoretical framework to measure re-identification risk in compact user representations.
Our framework formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation.
We show how our framework is general enough to model important real-world applications such as the Chrome's Topics API for interest-based advertising.
arXiv Detail & Related papers (2023-04-12T16:27:36Z) - Online Safety Property Collection and Refinement for Safe Deep
Reinforcement Learning in Mapless Navigation [79.89605349842569]
We introduce the Collection and Refinement of Online Properties (CROP) framework to design properties at training time.
CROP employs a cost signal to identify unsafe interactions and use them to shape safety properties.
We evaluate our approach in several robotic mapless navigation tasks and demonstrate that the violation metric computed with CROP allows higher returns and lower violations over previous Safe DRL approaches.
arXiv Detail & Related papers (2023-02-13T21:19:36Z) - FIRE: A Failure-Adaptive Reinforcement Learning Framework for Edge Computing Migrations [52.85536740465277]
FIRE is a framework that adapts to rare events by training a RL policy in an edge computing digital twin environment.
We propose ImRE, an importance sampling-based Q-learning algorithm, which samples rare events proportionally to their impact on the value function.
We show that FIRE reduces costs compared to vanilla RL and the greedy baseline in the event of failures.
arXiv Detail & Related papers (2022-09-28T19:49:39Z) - Resilient Risk based Adaptive Authentication and Authorization (RAD-AA)
Framework [3.9858496473361402]
We discuss the design considerations for a secure and resilient authentication and authorization framework capable of self-adapting based on the risk scores and trust profiles.
We call this framework as Resilient Risk based Adaptive Authentication and Authorization (RAD-AA)
arXiv Detail & Related papers (2022-08-04T11:44:29Z) - Mining Root Cause Knowledge from Cloud Service Incident Investigations
for AIOps [71.12026848664753]
Root Cause Analysis (RCA) of any service-disrupting incident is one of the most critical as well as complex tasks in IT processes.
In this work, we present ICA and the downstream Incident Search and Retrieval based RCA pipeline, built at Salesforce.
arXiv Detail & Related papers (2022-04-21T02:33:34Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.