Existing Authentication Techniques
What you know
- Username
- Password
- PINs
Shared, Easy to guess, Usually forgotten
What you have
- Cards
- NRIC, Passport
- Keys
Shared, Can be duplicated, Lost or stolen
What you know and have
- ATM + PIN
Shared, PIN is weak
What you are
- Fingerprint
- Face
- Voiceprint
- Iris scan
Not possible to share
Repudiation unlikely
Forging difficult
Cannot be lost or stolen
What a user has
What a user is
Standard biometrics
* Fingerprint, Retina, Face
Behavioral biometrics
* Keystroke dynamics;
* voice recognition;
* computer foot printing
* Gait (pattern of movement)
Cognitive biometrics
* Memorable events
* Identify specific faces
Attacks on Authentication System
Recommended having a more generalized warning message like the one shown below “Invalid login”. Instead of “username does not exist” or “Wrong password”
- XSS attacks
- Brute-force attempts using bots
- SQL Injection Attack
- Multiple login attempts from single IP
Prevention
Limiting the frequency of online login attempts to an account
through various actions:
* Enforcing multi-factor authentication, Anti-bot (e.g CAPTCHA), or other forms of verification
* Locking an account after a specified number of login attempts is reached
* Prohibiting multiple sessions for single user and location-based verification
Multi-factor authentication
Steps for 2FA
Brute force attack
An attempt to crack a password, using trial and error approach and hoping, eventually, to guess correctly.
Captcha - bot prevention
Completely Automated Public Turing test to tell Computers and Humans Apart
Types of Captcha
Account Lockout