Token-Based Authentication Monitoring System
| dc.contributor.author | Rujichaikul P. | |
| dc.contributor.author | Rassameeroj I. | |
| dc.contributor.correspondence | Rujichaikul P. | |
| dc.contributor.other | Mahidol University | |
| dc.date.accessioned | 2025-10-21T18:08:48Z | |
| dc.date.available | 2025-10-21T18:08:48Z | |
| dc.date.issued | 2025-10-14 | |
| dc.description.abstract | In modern web applications, token-based authentication has become a crucial mechanism for securing access to protected resources. JSON Web Tokens (JWTs), in particular, are widely adopted due to their stateless and scalable nature. However, this reliance makes tokens a prime target for attackers, with incidents of token theft and misuse via techniques such as Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and token hijacking on the rise. Existing security solutions like IDS and application firewalls are not designed to effectively detect token-specific attack patterns, leaving a critical security gap in modern authentication systems. To address this problem, we propose a Token-based Authentication Monitoring System capable of detecting, tracking, analyzing, and investigating suspicious token behaviors in real time. Our research focuses on JWT-based access tokens and the refresh token technique in OAuth 2.0 environments. A core contribution of this work is the design of 25 specialized detection rules based on patterns. We validated the proposed system through 70 comprehensive test cases covering both normal and attack scenarios. The system achieved an overall detection accuracy of 81.4%, demonstrating its capability to effectively detect token-related attacks overlooked by conventional defenses. Additionally, we evaluated the system’s performance, measuring detection latency and operational overhead in a realworld integration scenario. The results confirmed that the monitoring system delivers real-time detection with minimal impact on application responsiveness and system resources. This research offers a practical, adaptable framework that enhances the security of any system employing token-based authentication, reducing the risk of unauthorized access while maintaining system performance. | |
| dc.identifier.citation | Journal of Cyber Security and Mobility Vol.14 No.4 (2025) , 777-798 | |
| dc.identifier.doi | 10.13052/jcsm2245-1439.1441 | |
| dc.identifier.eissn | 22454578 | |
| dc.identifier.issn | 22451439 | |
| dc.identifier.scopus | 2-s2.0-105018737634 | |
| dc.identifier.uri | https://repository.li.mahidol.ac.th/handle/123456789/112693 | |
| dc.rights.holder | SCOPUS | |
| dc.subject | Computer Science | |
| dc.title | Token-Based Authentication Monitoring System | |
| dc.type | Article | |
| mu.datasource.scopus | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105018737634&origin=inward | |
| oaire.citation.endPage | 798 | |
| oaire.citation.issue | 4 | |
| oaire.citation.startPage | 777 | |
| oaire.citation.title | Journal of Cyber Security and Mobility | |
| oaire.citation.volume | 14 | |
| oairecerif.author.affiliation | Mahidol University |
