Account Takeover Prevention and Identity Verification with AI Models
Keywords:
Account takeover, identity verification, artificial intelligence, fraud prevention, machine learning, biometric authentication, anomaly detection, cybersecurityAbstract
Account Takeover (ATO) fraud has emerged as a critical cybersecurity threat, leading to significant financial and reputational losses for individuals and businesses. Traditional authentication mechanisms, including passwords and Multi-Factor Authentication (MFA), are increasingly vulnerable to sophisticated attacks such as credential stuffing, phishing, and social engineering. The rapid evolution of artificial intelligence (AI) has introduced advanced fraud detection and identity verification solutions that leverage machine learning, deep learning, and behavioral biometrics. This paper explores the threat landscape of ATO attacks, the role of AI in preventing such fraud, and emerging AI-driven authentication techniques. Furthermore, it evaluates the performance of AI-based security models, discusses regulatory and ethical considerations, and outlines future research directions in AI-powered fraud prevention.
Downloads
References
Artificial intelligence in society. 2019. doi: 10.1787/eedfee77-en.
T. Hewa, M. Ylianttila, and M. Liyanage, “Survey on blockchain based smart contracts: Applications, opportunities and challenges,” Journal of Network and Computer Applications, vol. 177, p. 102857, Nov. 2020, doi: 10.1016/j.jnca.2020.102857.
M. P. Wellman and U. Rajan, “Ethical issues for autonomous trading agents,” Minds and Machines, vol. 27, no. 4, pp. 609–624, Jan. 2017, doi: 10.1007/s11023-017-9419-4.
C. Bartneck, C. Lütge, A. Wagner, and S. Welsh, An introduction to ethics in robotics and AI. 2020. doi: 10.1007/978-3-030-51110-4.
M. Liyanage et al., “A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks,” Journal of Network and Computer Applications, vol. 203, p. 103362, Apr. 2022, doi: 10.1016/j.jnca.2022.103362.
M. Liyanage, A. Braeken, S. Shahabuddin, and P. Ranaweera, “Open RAN security: Challenges and opportunities,” Journal of Network and Computer Applications, vol. 214, p. 103621, Mar. 2023, doi: 10.1016/j.jnca.2023.103621.
D. K. Nguyen, G. Sermpinis, and C. Stasinakis, “Big data, artificial intelligence and machine learning: A transformative symbiosis in favour of financial technology,” European Financial Management, vol. 29, no. 2, pp. 517–548, Apr. 2022, doi: 10.1111/eufm.12365.
M. G. Porcedda and D. S. Wall, “Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack,” Account Takeover Prevention and Identity Verification With AI Models, pp. 443–452, Jun. 2019, doi: 10.1109/eurospw.2019.00056.
H. Fatima, H. U. Khan, and S. Akbar, “Home Automation and RFID-Based Internet of Things Security: Challenges and issues,” Security and Communication Networks, vol. 2021, pp. 1–21, Nov. 2021, doi: 10.1155/2021/1723535.
S. N. T. Vu, M. Stege, P. I. El-Habr, J. Bang, and N. Dragoni, “A survey on Botnets: Incentives, evolution, detection and current trends,” Future Internet, vol. 13, no. 8, p. 198, Jul. 2021, doi: 10.3390/fi13080198.
E. Ntizikira, W. Lei, F. Alblehai, K. Saleem, and M. A. Lodhi, “Secure and Privacy-Preserving intrusion detection and prevention in the internet of unmanned aerial vehicles,” Sensors, vol. 23, no. 19, p. 8077, Sep. 2023, doi: 10.3390/s23198077.
Kuraku, C., Gollangi, H. K., & Sunkara, J. R. (2020). Biometric Authentication in Digital Payments: Utilizing AI and Big Data for Real-Time Security and Efficiency. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4977530
Khurana, R. (2020). Fraud Detection in eCommerce Payment Systems: The Role of Predictive AI in Real-Time Transaction Security and Risk Management. International Journal of Applied Machine Learning and Computational Sciences.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.