TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vulnerabilities detection using attack recognition technique in multi-factor authentication

Dublin Core

Title

TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vulnerabilities detection using attack recognition technique in multi-factor authentication

Subject

Attack recognition, Efficiency, Multi-factor authentication, Security

Description

Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme.

Creator

Noor Afiza Mohd Ariffin, Fiza Abdul Rahim, Aziah Asmawi, Zul-Azri Ibrahim

Source

DOI: 10.12928/TELKOMNIKA.v18i4.14898

Publisher

Universitas Ahmad Dahlan

Date

August 2020

Contributor

Sri Wahyuni

Rights

ISSN: 1693-6930

Relation

http://journal.uad.ac.id/index.php/TELKOMNIKA

Format

PDF

Language

English

Type

Text

Coverage

TELKOMNIKA Telecommunication, Computing, Electronics and Control

Files

Collection

Tags

,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Citation

Noor Afiza Mohd Ariffin, Fiza Abdul Rahim, Aziah Asmawi, Zul-Azri Ibrahim, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vulnerabilities detection using attack recognition technique in multi-factor authentication,” Repository Horizon University Indonesia, accessed April 3, 2025, https://repository.horizon.ac.id/items/show/4000.