Research Article
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
| Level | Value | Type of behavior | Introduction |
| IV | 75–100 | Malicious security behavior | Attack system through a virus or Trojan horse; may cause very serious damage | II | 50–75 | Behavior of breaking a contract | Unauthorized operation may affect the normal operation of the system | I | 25–50 | Abnormal behavior | Includes abnormal operation, abnormal access content, etc.; does a little harm to the system | I | 0–25 | Abnormal condition | Includes abnormal login location, abnormal equipment, etc.; has almost no impact on the system |
|
|