As identity weaknesses are exploited, ARC backs RMIT–CA Labs to develop continuous user authentication

Continuous evaluation of user behaviour against baseline metrics will power a new approach to authentication that lies at the heart of a joint project between Victoria's RMIT University and software giant CA Technologies that was this week ramped up with the awarding of Australian Research Council (ARC) funding.

The project focuses on the alignment of risk adaptation and continuous authentication, two areas where the project's proponents have identified a need for focus in delivering better forms of authentication and user management.

Research conducted since May by RMIT University professors Serder Boztas, Asha Rao, Kathy Horadam and Lewi Stone will see them join forces with CA's Melbourne-based CA Labs research arm to develop new techniques for user authentication based on continuously evaluating security risk profiles and measuring the behavioural consistency of a user against previously observed behaviour.

By identifying “high-risk behaviour patterns”, continuous authentication will “provide a higher level of confidence around who the user is, without causing disruption to the user,” a research spokesperson said.

“Users typically authenticate to any given system only once – when they first access it (e.g. through providing a password or fingerprint),” their ARC filing, numbered LP140100698, says.

“The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone.”

The joint project “will develop a continuous authentication approach based on user behaviour – typical interactions plus biometrics (e.g. keystroke dynamics) – combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.”

New methods of user authentication are rapidly gaining currency as poor account and identity management are fingered in an ever-growing list of successful security breaches.

The recent hack of infidelity site Ashley Madison, for example, was attributed by Noel Biderman, chief executive of parent company Avid Life, as having been committed by “a person here that was not an employee but certainly had touched our technical services”.

Recent research from identity-management firm Centrify highlighted the importance of better user authentication, with the recent State of the Corporate Perimeter survey finding that 55 percent of IT decision makers had previously suffered a security breach – and 59 percent saying they had shared access credentials with other employees at least somewhat often.

Some 52 percent of respondents said they shared access with contractors at least somewhat often, with 82 percent saying it would be “at least somewhat easy” for contractors to access the company's digital assets. Fully 53 percent said former employees would be able to easily log in and access data.

A follow-up survey conducted amongst Australian IT managers found they felt besieged by attackers and that identity management was the key to improving the situation.

The RMIT-CA Labs project is the third successful ARC application for CA's local research arm, whose vice president of research Steve Versteeg called the awards a “testament to our focus on projects that are strategically important to Australia and information security in general, our commitment to the programs recommended, the quality of our proposal and of course, this team’s proven ability to deliver.”

The grant involves financial and in-kind funding from CA Technologies, the ARC and RMIT.

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Feeling social? Follow us on Twitter and LinkedIn Now!

Join the CSO newsletter!

Error: Please check your email address.

Tags Asha RaoLewi Stoneidentity managementIT managersCentrifyKathy HoradamRMIT–CAIdentityVictoria's RMIT UniversityCSO AustraliaARCAustralian Research Council (ARC)biometricsSerder Boztas

More about ARCAustralian Research CouncilAvidCA TechnologiesCentrifyCSOEnex TestLabRMITRMIT UniversityTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place