Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

A study of risk-based authentication system in cyber security using machine learning

Breadcrumb

  • Home
  • A study of risk-based authentication system in cyber security using machine learning

Imran M. Hussain Qureshi * and Vijay K. Kale

Dr. G Y Pathrikar College of CS and IT, MGM University, Aurangabad, Maharashtra, India.

Review Article
 
World Journal of Advanced Engineering Technology and Sciences, 2022, 07(02), 065–070.
Article DOI: 10.30574/wjaets.2022.7.2.0125
DOI url: https://doi.org/10.30574/wjaets.2022.7.2.0125

Received on 28 September 2022; revised on 05 November 2022; accepted on 08 November 2022

The optimum authentication method is determined by the user's risk profile, which is created using context- and behavior-based data from the user's device, finger print, one-time password, and other characteristics. Hacking and security breaches of online accounts, including social networking and web ac- counts, are very common in today's society. We suggest a Risk Based Authentication System utilizing Machine Learning to stop this. For the protection of data and money in this internet environment, security is a worry. Numerous parameters are researched and taken into consideration in the paper in order to solve the issue. These variables determine whether to grant the user permission or not. The gradients descent method is used to verify the user. Previous literature is re- viewed with technical details of the system before conclusion.

Authentication; Risk; Machine Learning; Gradients Descent; Security

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2022-0125.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Preview Article PDF

Imran M. Hussain Qureshi and Vijay K. Kale. A study of risk-based authentication system in cyber security using machine learning. World Journal of Advanced Engineering Technology and Sciences, 2022, 07(02), 065–070. Article DOI: https://doi.org/10.30574/wjaets.2022.7.2.0125

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution