Publication:
Vulnerabilities detection using attack recognition technique in multi-factor authentication

dc.citedby6
dc.contributor.authorAriffin N.A.M.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorAsmawi A.en_US
dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorid55349248100en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid25824748900en_US
dc.contributor.authorid57203863738en_US
dc.date.accessioned2023-05-29T08:13:00Z
dc.date.available2023-05-29T08:13:00Z
dc.date.issued2020
dc.description.abstractAuthentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme. � 2020 Universitas Ahmad Dahlan.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.12928/TELKOMNIKA.V18I4.14898
dc.identifier.epage2003
dc.identifier.issue4
dc.identifier.scopus2-s2.0-85087614936
dc.identifier.spage1998
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85087614936&doi=10.12928%2fTELKOMNIKA.V18I4.14898&partnerID=40&md5=ae565f7845c9d77918716e2b9424d6a9
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/25703
dc.identifier.volume18
dc.publisherUniversitas Ahmad Dahlanen_US
dc.relation.ispartofAll Open Access, Hybrid Gold, Green
dc.sourceScopus
dc.sourcetitleTelkomnika (Telecommunication Computing Electronics and Control)
dc.titleVulnerabilities detection using attack recognition technique in multi-factor authenticationen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections