Adaptive Authentication: How to Improve Security Without Annoying Users.

Introduction

How Adaptive Authentication Works

Adaptive Authentication Factors

Adaptive Authentication Policy Setup

Manual Configuration

  • Transparency — you determine which security policy is acceptable to you and configure it accordingly
  • Easy maintenance
  • Low consumption of computing resources
  • To setup policy experience in the subject area is required

Automatic Policy Configuration Using Machine Learning

  • Machine learning algorithms can identify factors or combinations of authentication factors that are not obvious to the expert
  • The possibility of continuous learning while accumulating authentication data and automatic algorithm adjustment when the logic of the authentication services changes
  • Requires qualified personnel to set up
  • Cold start problem — the system cannot work until enough data has been collected for machine learning
  • Using multiple models simultaneously increases the consumption of computing resources in the process, especially while training the models.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store