Abstract

Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.

Highlights

  • Advanced search options were configured to search in the abstract, when the search engine has this option or on the full text otherwise (e.g., ACM Digital Library has the option of searching within the abstract, but in Google Scholar we had to set up the search to find the terms “anywhere in the article”). e first 20 search results from each source, ordered by the number of citations can be found in the Supplementary Material

  • E “Research Questions (RQ)” Table 1 presents the matrix of the relationship between the research questions and the research studies that address them. e complete detailed table can be found in the Supplementary Material

  • We found the following artificial intelligence algorithms in the studies analyzed as part of this Systematic Literature Review (SLR): (i) Support Vector Machine (SVM): it is one of the most used classification techniques, and 10 of the 30 research papers analyzed use SVM

Read more

Summary

Introduction

A Systematic Literature Review (SLR) is a method of study focused on synthesizing all possible information about a specific research field. An SLR will be conducted through identification, selection, and evaluation of the state of the art [6]. Continuous authentication (CA) could be defined, within an access control system, as a new stage of authentication after the initial authentication has been completed, allowing for validation of a user or users during the session [7]. Checking if the users are who they claim to be during their session, it allows for further protection of information assets and facilitates detecting stolen credentials or other authentication information

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call