Open Access

Table 3.

Summary of behavioral benignity authentication

Object Description Characteristics Issues
Predictability of risk [139147] Predictability of risk refers to the distinction of potential behavioral risks in the network environment. (1) Prevention of potential attacks. (2) Remediation of exploitable vulnerabilities. (3) Reduction of losses through early warning. Due to the inherent uncertainty of evolving threats, ensuring the robustness of risk prediction needs to be complemented with other security technologies.

Consistency of execution [148155] Consistency of execution primarily refers to the method of credibility evaluation and potential risk detection that can perform consistent operations across complex and diverse networks. Ensuring the seamless execution of operations across various domains and heterogeneous networks in multiple scenarios facilitates unified risk management and resource optimization. Achieving consistency of execution requires compatibility with different resource forms and operating mechanisms in cross-domain interactions over heterogeneous networks.

Traceability of behavior [156160] Traceability of behavior refers to the traceability of potential risks or suspicious behaviors in the network environment. (1) Tracing suspicious behavior before it becomes a threat. (2) Tracing malicious behavior back to its source and close loopholes. (3) Tracing the source of related behaviors to reveal hidden attack chains. More sophisticated attackers excel at hiding their attack signatures and making attack behaviors indistinguishable from normal behaviors so that they lurk in systems for extended periods of time to carry out continuous attacks.

Integrity of record [161165] Integrity of record means that user data in a trusted network environment should remain complete, accurate, and non-tamperable. (1) Improvement of risk prediction accuracy through complete and accurate data. (2) Enhancement of traceability analysis reliability. Protecting record integrity faces multiple data tampering attacks and introduces performance overhead and system complexity like data protection in distributed systems.

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.