High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Mitigating Session Hijacking through Zero-Trust Continuous Authentication and Behavioral Biometrics

Author(s):

Pankaj Narwade , Modern College of Engineering, Pune; Dr. Prakash Kene, Modern College of Engineering, Pune

Keywords:

Zero-Trust Architecture, Continuous Authentication, Keystroke Dynamics, Mouse Trajectory, Web Bluetooth API, MERN Stack, Session Hijacking

Abstract

This research proposes a Zero-Trust Continuous Authentication (ZTCA) framework to combat modern session hijacking attacks, such as those from "Infostealer" malware that steal active session cookies to bypass traditional Multi- Factor Authentication (MFA). The framework integrates two verification layers: a Behavioral Biometrics layer that passively monitors user-specific patterns like keystroke dynamics and mouse movements to calculate a real-time "Trust Score," and a Cryptographic Ambient Signals layer that uses the Web Bluetooth API to perform a challenge-response handshake, ensuring the physical proximity of a trusted device and preventing MAC spoofing. Implemented on a MERN-stack architecture, this multi-modal approach is designed to significantly reduce the False Acceptance Rate for hijacked sessions while maintaining low latency and minimal disruption to the user, shifting security from a single login event to a continuous trust model.

Other Details

Paper ID: IJSRDV14I30104
Published in: Volume : 14, Issue : 3
Publication Date: 01/06/2026
Page(s): 150-158

Article Preview

Download Article