Security

Strengthening authentication through big data

Comment

Image Credits:

Ben Dickson

Contributor

Ben Dickson is a software engineer and the founder of TechTalks.

More posts from Ben Dickson

The fact that plain passwords are no longer safe to protect our digital identities is no secret. For years, the use of two-factor authentication (2FA) and multi-factor authentication (MFA) as a means to ensure online account security and prevent fraud has been a hot topic of discussion.

Technological advances, especially in the mobile industry, have created new possibilities, and manufacturers and vendors are offering various multi-factor solutions in the domain of biometrics, physical tokens, software tokens and mobile codes.

Yet, multi-factor authentication has its own set of challenges. For one thing, requiring users to respond to multi-factor authentication processes too often will make for a bothersome experience, and often leads to their total disablement by frustrated users. Moreover, many basic multi-factor authentication tokens can be circumvented by malicious users, which effectively renders them useless against hacks.

These complexities and flaws are proving to be an obstacle in the widespread integration of 2FA and MFA technologies, which in turn results in millions of insecure accounts that get hijacked and compromised on a yearly basis. In 2015 alone, nearly 200 million users lost their account credentials to malicious hackers.

So how can you enhance account security without disrupting the user experience? The answer might be found in big data and analytics, two trends that have proven their worth in many industries.

The idea is to unobtrusively gather information from several sources, including user behavior and device usage, to create a profile that is unique to the account owner and cannot be stolen or replicated by fraudulent users. The next steps would be to use the profile to detect activities that hint at malicious activity and only then initiate extra authentication steps to make sure the account hasn’t been hijacked or compromised.

This model has many strengths. It’s not something you lose, such as physical tokens; it doesn’t require extra memorization efforts; it can’t be stolen or replicated, such as passcodes, or even fingerprint and retina scans; and, above all, it’s not cumbersome and it doesn’t introduce extra complexities to the user experience.

This approach has become possible as a result of dramatic decreases in data storage costs and the explosion of cloud services, data collection technologies and advancements in web platforms and mobile technology. Several implementations of this concept are already showing promising signs.

A layered approach is the best way to authenticate users and secure online accounts from fraud. Jess Leroy, Senior Vice President of Product Management at TeleSign

TeleSign, an industry leader in the mobile identity industry, uses analytics and behavior-based authentication with its newly released Behavior ID platform, a software development kit (SDK) that enables web and mobile applications to measure and analyze a user’s behavioral biometrics in order to provide continuous authentication, even after the user has been verified with traditional security measures such as passwords.

Behavior ID’s mechanics involve collecting data on a user by evaluating their behavioral patterns across a range of touch points, including how a user types on the keyboard, how they hold their device, how hard they press a device screen, their mouse dynamics, user interface interaction, etc. The data is then used to establish a “digital fingerprint from the user’s behavior,” as Steve Jillings, CEO at TeleSign, explains. The profile is stored in TeleSign’s cloud platform and helps the system detect and block account takeover attempts. The goal, Jillings says, “is to increase the level of identity assurance… without adding friction.”

Behavior ID calculates a “similarity score” between the user’s current behavior and the historical, expected behavior. This helps streamline the experience for known good users, while raising the alarm on suspicious account access and providing the basis for challenging potentially bad or fraudulent users with re-verification, or two-factor authentication.

“A layered approach is the best way to authenticate users and secure online accounts from fraud,” says Jess Leroy, Senior Vice President of Product Management at TeleSign. “Behavioral biometrics enable us to take that a step further by adding even more levels of assurance without adding any friction to the end-user or requiring them to take any steps to initiate or own any specific device to use.”

Cybersecurity giant RSA’s Adaptive Authentication is another platform that uses an analytics-based approach. Adaptive Authentication analyzes and registers the devices users employ to access their accounts, which includes information such as operating system, browser type and version. It also profiles user behavior, which accounts for various activities that are typical for the user. It then feeds this data in a self-learning statistical machine learning engine, which uses it to evaluate in real time the risk of activities being carried out on the account.

This all takes place in the background, without requiring intervention on the user’s part. As long as users do not engage in abnormal behavior or do not access their account from a previously unknown or security-flagged location, they will not be interrupted.

If the risk score of an action surpasses the threshold set by the organization, the system makes decisions based on policies defined for that type of activity. This can include anything from silently warning the security department to prompting the user for additional authentication or blocking access altogether.

Analytics and big data have become an inseparable part of online businesses in recent years, and are helping companies increase revenue and improve user experience and customer service while lowering costs. This growing trend can also come into the service of cybersecurity and help balance security and convenience, and prevent fraud and improve identity security while avoiding all the complexities that traditional methods trail behind them.

More TechCrunch

For over six decades, the nonprofit has been active in the financial services sector.

Accion’s new $152.5M fund will back financial institutions serving small businesses globally

Meta’s newest social network, Threads is starting its own fact-checking program after piggybacking on Instagram and Facebook’s network for a few months. Instagram head Adam Mosseri noted that the company…

Threads finally starts its own fact-checking program

Looking Glass makes trippy-looking mixed-reality screens that make things look 3D without the need of special glasses. Today, it launches a pair of new displays, including a 16-inch mode that…

Looking Glass launches new 3D displays

Replacing Sutskever is Jakub Pachocki, OpenAI’s director of research.

Ilya Sutskever, OpenAI co-founder and longtime chief scientist, departs

Intuitive Machines made history when it became the first private company to land a spacecraft on the moon, so it makes sense to adapt that tech for Mars.

Intuitive Machines wants to help NASA return samples from Mars

As Google revamps itself for the AI era, offering AI overviews within its search results, the company is introducing a new way to filter for just text-based links. With the…

Google adds ‘Web’ search filter for showing old-school text links as AI rolls out

Blue Origin’s New Shepard rocket will take a crew to suborbital space for the first time in nearly two years later this month, the company announced on Tuesday.  The NS-25…

Blue Origin to resume crewed New Shepard launches on May 19

This will enable developers to use the on-device model to power their own AI features.

Google is building its Gemini Nano AI model into Chrome on the desktop

It ran 110 minutes, but Google managed to reference AI a whopping 121 times during Google I/O 2024 (by its own count). CEO Sundar Pichai referenced the figure to wrap…

Google mentioned ‘AI’ 120+ times during its I/O keynote

Firebase Genkit is an open source framework that enables developers to quickly build AI into new and existing applications.

Google launches Firebase Genkit, a new open source framework for building AI-powered apps

In the coming months, Google says it will open up the Gemini Nano model to more developers.

Patreon and Grammarly are already experimenting with Gemini Nano, says Google

As part of the update, Reddit also launched a dedicated AMA tab within the web post composer.

Reddit introduces new tools for ‘Ask Me Anything,’ its Q&A feature

Here are quick hits of the biggest news from the keynote as they are announced.

Google I/O 2024: Here’s everything Google just announced

LearnLM is already powering features across Google products, including in YouTube, Google’s Gemini apps, Google Search and Google Classroom.

LearnLM is Google’s new family of AI models for education

The official launch comes almost a year after YouTube began experimenting with AI-generated quizzes on its mobile app. 

Google is bringing AI-generated quizzes to academic videos on YouTube

Around 550 employees across autonomous vehicle company Motional have been laid off, according to information taken from WARN notice filings and sources at the company.  Earlier this week, TechCrunch reported…

Motional cut about 550 employees, around 40%, in recent restructuring, sources say

The keynote kicks off at 10 a.m. PT on Tuesday and will offer glimpses into the latest versions of Android, Wear OS and Android TV.

Google I/O 2024: Watch all of the AI, Android reveals

Google Play has a new discovery feature for apps, new ways to acquire users, updates to Play Points, and other enhancements to developer-facing tools.

Google Play preps a new full-screen app discovery feature and adds more developer tools

Soon, Android users will be able to drag and drop AI-generated images directly into their Gmail, Google Messages and other apps.

Gemini on Android becomes more capable and works with Gmail, Messages, YouTube and more

Veo can capture different visual and cinematic styles, including shots of landscapes and timelapses, and make edits and adjustments to already-generated footage.

Google Veo, a serious swing at AI-generated video, debuts at Google I/O 2024

In addition to the body of the emails themselves, the feature will also be able to analyze attachments, like PDFs.

Gemini comes to Gmail to summarize, draft emails, and more

The summaries are created based on Gemini’s analysis of insights from Google Maps’ community of more than 300 million contributors.

Google is bringing Gemini capabilities to Google Maps Platform

Google says that over 100,000 developers already tried the service.

Project IDX, Google’s next-gen IDE, is now in open beta

The system effectively listens for “conversation patterns commonly associated with scams” in-real time. 

Google will use Gemini to detect scams during calls

The standard Gemma models were only available in 2 billion and 7 billion parameter versions, making this quite a step up.

Google announces Gemma 2, a 27B-parameter version of its open model, launching in June

This is a great example of a company using generative AI to open its software to more users.

Google TalkBack will use Gemini to describe images for blind people

Google’s Circle to Search feature will now be able to solve more complex problems across psychics and math word problems. 

Circle to Search is now a better homework helper

People can now search using a video they upload combined with a text query to get an AI overview of the answers they need.

Google experiments with using video to search, thanks to Gemini AI

A search results page based on generative AI as its ranking mechanism will have wide-reaching consequences for online publishers.

Google will soon start using GenAI to organize some search results pages

Google has built a custom Gemini model for search to combine real-time information, Google’s ranking, long context and multimodal features.

Google is adding more AI to its search results