An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
One popular scheme used for authentication security is the implementation of multi-factor authentication (MFA). There have been several researches that discusses on multi-factor authentication scheme but most of these research do not entirely protect data against all types of attacks. Furthermore,...
| Main Authors: | Mohd Ariffin, Noor Afiza, Mohd Rum, Siti Nurulain, Abdul Rahim, Fiza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/80575/ http://psasir.upm.edu.my/id/eprint/80575/1/SECURITY.pdf |
Similar Items
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
Presentation attack detection for face recognition on smartphones: a comprehensive review
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Defense against adversarial attack in image recognition
by: Ng, Shi Qi
Published: (2024)
by: Ng, Shi Qi
Published: (2024)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020)
by: Hasan, Dana, et al.
Published: (2020)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Lifestyles and Migraine Attack
by: Chih, Hui Jun, et al.
Published: (2011)
by: Chih, Hui Jun, et al.
Published: (2011)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Similar Items
-
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017) -
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018) -
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016) -
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014) -
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)