{"title":"用户数字足迹在自适应认证中的应用","authors":"A. Salomatin, A. Iskhakov, R. Meshcheryakov","doi":"10.1109/SIBCON50419.2021.9438880","DOIUrl":null,"url":null,"abstract":"This paper describes the application of adaptive user authentication based on a calculated digital footprint. The digital footprint is considered as an integrated indicator that the user is unique in its set of characteristics and behavior on the network. The main classes of digital footprint sources are marked, with the greatest attention paid to browser fingerprints. Using a mathematically supported method based on the comparison of the digital footprint, an experiment is conducted to determine the authenticity of the user in the three cases under consideration. The experiment showed that the method works correctly and successfully and can give better results by optimizing its parameters: the weights of criteria, the weights of browser fingerprints and the threshold value of user’s uniqueness.","PeriodicalId":150550,"journal":{"name":"2021 International Siberian Conference on Control and Communications (SIBCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Application of the User’s Digital Footprint in the Adaptive Authentication Problem\",\"authors\":\"A. Salomatin, A. Iskhakov, R. Meshcheryakov\",\"doi\":\"10.1109/SIBCON50419.2021.9438880\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes the application of adaptive user authentication based on a calculated digital footprint. The digital footprint is considered as an integrated indicator that the user is unique in its set of characteristics and behavior on the network. The main classes of digital footprint sources are marked, with the greatest attention paid to browser fingerprints. Using a mathematically supported method based on the comparison of the digital footprint, an experiment is conducted to determine the authenticity of the user in the three cases under consideration. The experiment showed that the method works correctly and successfully and can give better results by optimizing its parameters: the weights of criteria, the weights of browser fingerprints and the threshold value of user’s uniqueness.\",\"PeriodicalId\":150550,\"journal\":{\"name\":\"2021 International Siberian Conference on Control and Communications (SIBCON)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Siberian Conference on Control and Communications (SIBCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCON50419.2021.9438880\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON50419.2021.9438880","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of the User’s Digital Footprint in the Adaptive Authentication Problem
This paper describes the application of adaptive user authentication based on a calculated digital footprint. The digital footprint is considered as an integrated indicator that the user is unique in its set of characteristics and behavior on the network. The main classes of digital footprint sources are marked, with the greatest attention paid to browser fingerprints. Using a mathematically supported method based on the comparison of the digital footprint, an experiment is conducted to determine the authenticity of the user in the three cases under consideration. The experiment showed that the method works correctly and successfully and can give better results by optimizing its parameters: the weights of criteria, the weights of browser fingerprints and the threshold value of user’s uniqueness.