Long a staple technology for fraud detection in the financial services industry, machine learning is increasingly being used in conjunction with behavior recognition to deliver identity assurance. Credit: iStock Behavior recognition is a powerful tool, helping to establish that people who request access to business applications or services are in fact who they say they are. When someone attempts to sign in from a familiar device in a familiar location, for example, behavior recognition picks up on those cues. And now it’s proving even more effective when paired with machine learning, which makes it possible to adapt in response to how users behave throughout their access history. The result is higher confidence in a user’s identity and, at the same time, less need to inconvenience the user with requests for additional authentication.A New Way to Apply the Machine Learning ModelIn traditional fraud detection scenarios, machine learning tools look at broad user populations and report back on fraudulent transaction attempts, using the information collected to continually improve the data model. Machine learning in this context relies on people reporting discrepancies in their bank accounts or credit card activity. That makes it less useful for user authentication, because people aren’t likely to be aware of, and therefore can’t report on, unauthorized attempts to access the business services and applications they use. In applying machine learning to user authentication, the focus of the model shifts from fraud detection to identity assurance. In other words, how confident can you be that a given user is who he or she claims to be, based on past successful authentications? This confidence is gained by learning from data in users’ past authentication attempts, such as: Location/networkTime of dayDevice fingerprintPattern of accessKeystroke dynamicsMuch of this data is the same as what’s used to establish static business context rules for access requests. The difference lies in how the data is applied. Instead of declaring a network address “trusted,” for example, the idea is to analyze user activity to determine if the user has repeatedly provided a high level of authentication from a particular IP address. That provides one data point to consider when determining confidence in the user’s identity. Combine it with other data points, creating confidence across multiple attributes, and you can make an informed determination about whether more authentication is needed.Don’t Be Left Behind Machine learning for user authentication in this context is rapidly evolving. As the possibilities for understanding and responding to a variety of behaviors develop, there’s tremendous potential for authentication that’s even more secure, with less friction for users. As you consider how to take advantage of machine learning, keep in mind that no matter how sophisticated the static rules you use for business context, they can never match the capabilities of an approach that includes machine learning.Don’t be left behind; make sure machine learning has a place in your identity assurance strategy. As you seek out identity and access management partners, look for those that also have a strategy to keep up in this rapidly changing space. Meanwhile, learn more about leveraging identity assurance in the authentication process in this on-demand webinar. Related content opinion 3 Ways to Get Mobile Biometric Authentication Up and Running Fast Successfully adopting or expanding biometrics for mobile authentication may be a lot faster and easier than you think. By Dave Taku Oct 02, 2018 3 mins Identity Management Solutions Security opinion It Takes Two to Manage Identity Risk: Your Identity and Security Operations Teams In the fight to keep identity risk in check, identity teams are discovering a powerful ally: The Security Operations Center. By Dave Taku Sep 24, 2018 3 mins Identity Management Solutions Security opinion The Case for Multi-Factor Authentication Wherever Users Connect Use multi-factor authentication to add more security for cloud apps, privileged accounts, digital workspaces, VPNs and legacy apps – without sacrificing convenience By Tim Norris Aug 08, 2018 3 mins Identity Management Solutions Security opinion Don’t Let Siloed Identity Governance Put Your Organization at Risk In today’s complex access environment, a holistic approach to identity governance and administration makes sense. By Tim Norris Aug 08, 2018 3 mins Identity Management Solutions Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe