Token-Based Authentication Monitoring System

dc.contributor.authorRujichaikul P.
dc.contributor.authorRassameeroj I.
dc.contributor.correspondenceRujichaikul P.
dc.contributor.otherMahidol University
dc.date.accessioned2025-10-21T18:08:48Z
dc.date.available2025-10-21T18:08:48Z
dc.date.issued2025-10-14
dc.description.abstractIn modern web applications, token-based authentication has become a crucial mechanism for securing access to protected resources. JSON Web Tokens (JWTs), in particular, are widely adopted due to their stateless and scalable nature. However, this reliance makes tokens a prime target for attackers, with incidents of token theft and misuse via techniques such as Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and token hijacking on the rise. Existing security solutions like IDS and application firewalls are not designed to effectively detect token-specific attack patterns, leaving a critical security gap in modern authentication systems. To address this problem, we propose a Token-based Authentication Monitoring System capable of detecting, tracking, analyzing, and investigating suspicious token behaviors in real time. Our research focuses on JWT-based access tokens and the refresh token technique in OAuth 2.0 environments. A core contribution of this work is the design of 25 specialized detection rules based on patterns. We validated the proposed system through 70 comprehensive test cases covering both normal and attack scenarios. The system achieved an overall detection accuracy of 81.4%, demonstrating its capability to effectively detect token-related attacks overlooked by conventional defenses. Additionally, we evaluated the system’s performance, measuring detection latency and operational overhead in a realworld integration scenario. The results confirmed that the monitoring system delivers real-time detection with minimal impact on application responsiveness and system resources. This research offers a practical, adaptable framework that enhances the security of any system employing token-based authentication, reducing the risk of unauthorized access while maintaining system performance.
dc.identifier.citationJournal of Cyber Security and Mobility Vol.14 No.4 (2025) , 777-798
dc.identifier.doi10.13052/jcsm2245-1439.1441
dc.identifier.eissn22454578
dc.identifier.issn22451439
dc.identifier.scopus2-s2.0-105018737634
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/123456789/112693
dc.rights.holderSCOPUS
dc.subjectComputer Science
dc.titleToken-Based Authentication Monitoring System
dc.typeArticle
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105018737634&origin=inward
oaire.citation.endPage798
oaire.citation.issue4
oaire.citation.startPage777
oaire.citation.titleJournal of Cyber Security and Mobility
oaire.citation.volume14
oairecerif.author.affiliationMahidol University

Files

Collections