Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Table 5

Level of risk behavior.

LevelValueType of behaviorIntroduction

IV75–100Malicious security behaviorAttack system through a virus or Trojan horse; may cause very serious damage
II50–75Behavior of breaking a contractUnauthorized operation may affect the normal operation of the system
I25–50Abnormal behaviorIncludes abnormal operation, abnormal access content, etc.; does a little harm to the system
I0–25Abnormal conditionIncludes abnormal login location, abnormal equipment, etc.; has almost no impact on the system