<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-2-0-2</article-id><article-id pub-id-type="publisher-id">3488</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;INVESTIGATION OF AUTHENTICATION METHODS&amp;nbsp;ON WEB SERVICES. CURRENT TRENDS&amp;nbsp;AND DEVELOPMENT PROSPECTS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;INVESTIGATION OF AUTHENTICATION METHODS&amp;nbsp;ON WEB SERVICES. CURRENT TRENDS&amp;nbsp;AND DEVELOPMENT PROSPECTS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Abselyamov</surname><given-names>Amet-Han Alim-ogly</given-names></name><name xml:lang="en"><surname>Abselyamov</surname><given-names>Amet-Han Alim-ogly</given-names></name></name-alternatives><email>batrebless@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name><name xml:lang="en"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name></name-alternatives><email>lagutkina.tatiana@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/2/ИТ_НР_9_2_2.pdf" /><abstract xml:lang="ru"><p>In the development of information technology, software and data protection on web services are of great importance. To ensure security, various methods are used, and one of the main ones is the user authentication process. They use different authentication methods: password, two-factor authentication, biometric, multi-factor, based on artificial intelligence and blockchain technologies. Despite their diversity, each method has its own advantages and disadvantages. Current trends in authentication include combining different methods to increase reliability and improve the user experience. The future of this technology involves finding new ways to balance security and usability, as well as continually updating and adapting methods to changing security threats. This article conducts a study of various authentication methods for web services in order to identify their effectiveness, advantages and disadvantages.</p></abstract><trans-abstract xml:lang="en"><p>In the development of information technology, software and data protection on web services are of great importance. To ensure security, various methods are used, and one of the main ones is the user authentication process. They use different authentication methods: password, two-factor authentication, biometric, multi-factor, based on artificial intelligence and blockchain technologies. Despite their diversity, each method has its own advantages and disadvantages. Current trends in authentication include combining different methods to increase reliability and improve the user experience. The future of this technology involves finding new ways to balance security and usability, as well as continually updating and adapting methods to changing security threats. This article conducts a study of various authentication methods for web services in order to identify their effectiveness, advantages and disadvantages.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>authentication</kwd><kwd>web services</kwd><kwd>data security</kwd><kwd>threats</kwd><kwd>protection</kwd><kwd>multi-factor authentication</kwd><kwd>biometric identification</kwd><kwd>password</kwd><kwd>two-factor authentication</kwd><kwd>technology</kwd></kwd-group><kwd-group xml:lang="en"><kwd>authentication</kwd><kwd>web services</kwd><kwd>data security</kwd><kwd>threats</kwd><kwd>protection</kwd><kwd>multi-factor authentication</kwd><kwd>biometric identification</kwd><kwd>password</kwd><kwd>two-factor authentication</kwd><kwd>technology</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Feoktistov I.V. Comparative study of authentication methods in information systems // Innovations and investments. &amp;ndash; 2023. &amp;ndash; No. 7. &amp;ndash; pp. 193-198.</mixed-citation></ref><ref id="B2"><mixed-citation>Khrunov S.N. Development and research of authentication methods // Postgraduate student. &amp;ndash; 2016. &amp;ndash; No&amp;nbsp;3.&amp;nbsp;&amp;ndash; pp. 189-191.</mixed-citation></ref><ref id="B3"><mixed-citation>Baiditskaya V.K., Limanova N.I. Research of authentication methods based on generation of one-time passwords //Applied mathematics and computer science: modern research in the field of natural and technical sciences. &amp;ndash; 2017. &amp;ndash; P. 57-60.</mixed-citation></ref><ref id="B4"><mixed-citation>Maslova M.A., Avetisyan V.A. Risks of information security in conditions of remote connection and cloud presence // Bulletin of the Urals Federal District. Security in the information sphere. &amp;ndash; 2023. &amp;ndash; No. 3(49). &amp;ndash; P.&amp;nbsp;54-60.</mixed-citation></ref><ref id="B5"><mixed-citation>Vein scanner as the future of biometrics (bio-smart.ru) [Electronic resource]. URL: https://bio-smart.ru/tpost/pjx36nnktb-skaner-ven-kak-buduschee-biometrii</mixed-citation></ref><ref id="B6"><mixed-citation>Gerasimov V.M., Maslova M.A. Possible threats and attacks on the user voice identification system // Research result. Information technologies. &amp;ndash; Т.7, №1, 2022. &amp;ndash; P. 32-37. DOI: 10.18413/2518-1092-2022-7-1-0-4</mixed-citation></ref><ref id="B7"><mixed-citation>Gerasimov V.M., Maslova M.A. The need for a comprehensive system for protecting a biometric voice print from the influence of cyber fraudsters on the Internet // Bulletin of Lugansk State University named after Vladimir Dahl. &amp;ndash; 2022. &amp;ndash; No. 5(59). &amp;ndash; P. 95-102.</mixed-citation></ref><ref id="B8"><mixed-citation>Review of authentication methods and protocols in web applications [Electronic resource]. URL: https://habr.com/ru/companies/dataart/articles/262817/.</mixed-citation></ref><ref id="B9"><mixed-citation>Martynova L.E., Umnitsyn M.Yu., Nazarova K.E., Peresypkin I.P. Research and comparative analysis of authentication methods // Young scientist. &amp;ndash; 2016. &amp;ndash; No.&amp;nbsp;19&amp;nbsp;(123). &amp;ndash; P.&amp;nbsp;90-93. &amp;ndash; URL: https://moluch.ru/archive/123/34077/.</mixed-citation></ref><ref id="B10"><mixed-citation>Analysis of vulnerabilities of the authentication process [Electronic resource]. URL: https://bmsdave.github.io/blog/auth-vulnerabilities/.</mixed-citation></ref><ref id="B11"><mixed-citation>Khalilaeva E.I., Maslova M.A., Gerasimov V.M. System of counteraction to social engineering methods in the field of information security // Bulletin of the Urals Federal District. Security in the information sphere. &amp;ndash; 2023.&amp;nbsp;&amp;ndash; No. 2(48). &amp;ndash; P. 54-61.</mixed-citation></ref><ref id="B12"><mixed-citation>Palutina G.N. Application of the technology of probabilistic expert systems to evaluate the conclusions of a multi-factor authentication system // Current issues of regional information security in the context of Russia&amp;rsquo;s transition to a digital economy: materials of the VII All-Russian Scientific and Practical Conference, Volgograd, April 26&amp;ndash;27, 2018 / Volgograd State University. &amp;ndash; Volgograd: Volgograd State University, 2018. &amp;ndash; pp. 51-55.</mixed-citation></ref><ref id="B13"><mixed-citation>Korovyansky I.A., Pilgaeva V.V., Palutina G.N. Methods of defense and attack using artificial intelligence&amp;nbsp;// Information systems, economics and management: Scientific notes. Volume Issue 24. &amp;ndash; Rostov-on-Don: Rostov State Economic University &amp;quot;RINH&amp;quot;, 2022. &amp;ndash; P. 38-40.</mixed-citation></ref><ref id="B14"><mixed-citation>Regulation of AI (AI) / Habr (habr.com) [Electronic resource]. URL: https://habr.com/ru/articles/789544/.</mixed-citation></ref></ref-list></back></article>