AI Enabled Extraction of Secure Authentication and Data Access Flows from HAR Traces

Authors

  • Surya Ravikumar Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9416.ICAIDSCT26-134

Keywords:

HAR Traces, Authentication Workflows, Data Access Flows, Artificial Intelligence, Machine Learning, Oauth, API Security, Fintech Integration, Network Traffic Analysis

Abstract

To safely access protected data modern online and mobile applications rely on sophisticated authentication and authorization techniques like OAuth, OpenID Connect, API keys, multi factor authentication and proprietary token exchanges. Platform integrators, security teams, QA engineers and financial data aggregators must comprehend these methods. Nevertheless, documentation is sometimes sparse, outdated or unavailable. By recording headers, payloads, cookies, redirection and time data, HTTP Archive (HAR) traces offer a comprehensive, low level record of network interactions between clients and servers. In this paper, an AI enabled method for automatically extracting data access procedures and secure authentication from HAR traces is presented. The suggested method reconstructs end-to-end authentication procedures, determines token lifecycles and maps data access patterns by fusing machine learning, sequence modeling and rule based security heuristics. With an emphasis on fintech and regulated contexts, the paper addresses system design, feature engineering, model selection, security issues and real world implementations.

References

1. RFC 2068: Hypertext Transfer Protocol -- HTTP/1.1. (n.d.). IETF Datatracker.

https://datatracker.ietf.org/doc/html/rfc2068

2. Hardt, D., & Jones, M. (2012). The OAUTH 2.0 Authorization Framework: Bearer Token usage. RFC, 6750, 1–18. https://art.tools.ietf.org/html/draft-ietf-oauth-v2-bearer

3. Final: OpenID Connect Core 1.0 incorporating errata set 2. (n.d.). https://openid.net/specs/openid-connect-core-1_0.html

4. Kisller, E. (2025, March 18). HAR files web requests and web traffic. LivePerson Customer Success Center. https://community.liveperson.com/kb/articles/1556-har-files-web-requests-and-web-traffic

5. Malashkevych, O. (2025, June 9). How to download, view, and analyze HAR Files: A Step-by-Step Guide. Webvizio | Website Feedback & Bug Tracking Tool. https://webvizio.com/blog/how-to-download-view-and-analyze-har-files/

Downloads

Published

2026-02-17

How to Cite

1.
Ravikumar S. AI Enabled Extraction of Secure Authentication and Data Access Flows from HAR Traces. IJAIBDCMS [Internet]. 2026 Feb. 17 [cited 2026 Feb. 17];:295-300. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/424