TY - GEN
T1 - Classification of Authentication Approaches to Stop the Next Breaking
T2 - 5th International Conference on Computer and Applications, ICCA 2023
AU - Qbea'h, Mohammad
AU - Alkaabi, Jameela
AU - Almansouri, Shamma
AU - Alneyadi, Al Maha
AU - Alderei, Mouza
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - These days, the scope of a huge number of web, desktop, IoT, cloud and mobile applications being compromised is rapidly increasing. The attackers exploit weak authentication techniques to compromise government, educational, financial, and healthcare systems to access sensitive information. Authentication failure is very serious according to Open Web Application Security Project (OWASP) organization. This organization has ranked authentication failure among the top ten risks in the world in 2021 and 2023. In this study, we discuss the authentication technologies in terms of advantages, disadvantages, and drawbacks of some common authentication methods. We provide a comprehensive comparison table between several types of authentication techniques. Furthermore, we provide important recommendations for the future direction. Additionally, we provide a list of crucial factors for decision-makers to consider when selecting the appropriate authentication type. This research serves to raise awareness about the dangers of vulnerable authentication, benefiting users, companies, and researchers.
AB - These days, the scope of a huge number of web, desktop, IoT, cloud and mobile applications being compromised is rapidly increasing. The attackers exploit weak authentication techniques to compromise government, educational, financial, and healthcare systems to access sensitive information. Authentication failure is very serious according to Open Web Application Security Project (OWASP) organization. This organization has ranked authentication failure among the top ten risks in the world in 2021 and 2023. In this study, we discuss the authentication technologies in terms of advantages, disadvantages, and drawbacks of some common authentication methods. We provide a comprehensive comparison table between several types of authentication techniques. Furthermore, we provide important recommendations for the future direction. Additionally, we provide a list of crucial factors for decision-makers to consider when selecting the appropriate authentication type. This research serves to raise awareness about the dangers of vulnerable authentication, benefiting users, companies, and researchers.
KW - authentication
KW - authentication failure
KW - biometrics
KW - password cracking
KW - single sign on
KW - survey
KW - vulnerabilities
UR - http://www.scopus.com/inward/record.url?scp=85185194716&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85185194716&partnerID=8YFLogxK
U2 - 10.1109/ICCA59364.2023.10401373
DO - 10.1109/ICCA59364.2023.10401373
M3 - Conference contribution
AN - SCOPUS:85185194716
T3 - ICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings
BT - ICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings
A2 - Alja'Am, Jihad Mohamad
A2 - Alja'Am, Jihad Mohamad
A2 - Elseoud, Samir Abou
A2 - Karam, Omar
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 28 November 2023 through 30 November 2023
ER -