Artificial Intelligence and Advanced Cybersecurity to Mitigate Credential-Stuffing Attacks in the Banking Industry
DOI:
https://doi.org/10.22399/ijcesen.754Keywords:
Credential-Stuffing, Machine learning, Stolen credentials, User behaviour analytics, Adaptive authentication, AIAbstract
Credential-stuffing attacks pose a critical threat to the banking sector, leveraging stolen login credentials to compromise user accounts and inflict substantial financial and reputational damage. Traditional security measures, including Multi-Factor Authentication (MFA) and CAPTCHA, often fall short against the sophistication of these attacks, necessitating more advanced and proactive defense strategies.
This study explores the transformative role of artificial intelligence (AI) and machine learning (ML) in cybersecurity, particularly in mitigating credential-stuffing threats. AI-driven solutions enable real-time threat detection, predictive analysis, and adaptive authentication, providing enhanced protection by analyzing large datasets to identify unusual login patterns and behaviors. Despite their promise, AI and ML adoption in cybersecurity faces challenges, including data privacy concerns, the risk of false positives and negatives, and scalability barriers. This research also examines emerging technologies, such as federated learning and blockchain-based authentication, which offer decentralized and privacy-preserving approaches to combating credential-stuffing attacks. Ultimately, AI and ML present the banking sector with powerful tools to build resilient, adaptable, and efficient defenses against evolving cyber threats. By integrating these technologies with complementary innovations, financial institutions can enhance security, protect customer trust, and address the dynamic landscape of credential-based cyberattacks.
References
HHS Cybersecurity Program. (2019). Credential stuffing. https://www.hhs.gov/sites/default/files/credential-stuffing.pdf
Security Intelligence. (2021). The state of credential stuffing attacks. https://securityintelligence.com/articles/credential-stuffing-attacks-2021/
N. K., et al. (2023). AI in cybersecurity: Threat detection and response with machine learning. Tuijin Jishu/Journal of Propulsion Technology, 44(3), 38–46. https://doi.org/10.52783/tjjpt.v44.i3.237
Auth0. (2020). Credential stuffing attacks: What are they and how to combat them. https://assets.ctfassets.net/2ntc334xpx65/5ooYXF36tG52EfKLvrbyvm/f6d40b276754186b14d394ddf9bf5d59/Credential_Stuffing_Attacks_2-v1.pdf
Patel, P., Goswami, P., Mishra, A., Khan, S., & Choudhary, A. (2021). Brute force, dictionary and rainbow table attack on hashed passwords. International Journal of Creative Research Thoughts (IJCRT, 9(4). https://ijcrt.org/papers/IJCRT2104242.pdf
Barkworth, A., Tabassum, R., & Lashkari, A. (2023). Detecting IMAP credential stuffing bots using behavioural biometrics. ACM Digital Library. https://doi.org/10.1145/3586102.3586104
Kirkbride, P. (2020). OpenBullet: Credential stuffing for script kiddies and career criminals. International Journal of Scientific & Technology Research, 9(1). https://www.ijstr.org/final-print/mar2020/Openbullet-Credential-Stuffing-For-Script-Kiddies-And-Career-Criminals.pdf
Nimmo, B., Agranovich, D., & Gleicher, N. (2022). Adversarial threat report: Purpose of this report. Meta. https://about.fb.com/wp-content/uploads/2022/04/Meta-Quarterly-Adversarial-Threat-Report_Q1-2022.pdf
Smalley, S. (2024, February 7). Google agrees to $350 million settlement over data leak. The Record. https://therecord.media/google-agrees-to-settle-data-leak
Bajak, F. (2024, February 2). Microsoft says state-backed Russian hackers accessed emails of senior leadership team members. AP News. https://apnews.com/article/microsoft-russian-hackers-email-breach-sec-rule-84610492e56778767116a3f89f7ff658
Kron, E. (2021). The human problem behind credential theft and reuse. Cyber Security: A Peer-Reviewed Journal, 4(3), 223. https://doi.org/10.69554/NHDY5855
Muller, M. (2019). Coinbase security: Now protecting your Coinbase account in more places. Coinbase. https://www.coinbase.com/blog/coinbase-security-now-protecting-your-coinbase-account-in-more-places
Mueller, N. (n.d.). Credential stuffing software attack. OWASP Foundation. https://owasp.org/www-community/attacks/Credential_stuffing
Communications Security Establishment. (2022). Strategies for protecting web application systems against credential stuffing attacks. https://www.cyber.gc.ca/sites/default/files/cyber/2022-01/ITSP-30-035-Strategies-for-protecting-against-credential-stuffing-attacks_e.pdf
Manankova, O. A., Yakubova, M. Z., Rakhmatullaev, M. A., & Baikenov, A. S. (2023). Simulation of the rainbow attack on the SHA-256 hash function. Journal of Theoretical and Applied Information Technology, 28(4). https://www.jatit.org/volumes/Vol101No4/36Vol101No4.pdf
F5. (2015, January 21). Attack tool on the rise: Account checker. https://www.f5.com/company/blog/attack-tool-on-the-rise-account-checker
IC3. (2022). Proxies and configurations used for credential stuffing attacks on online customer accounts. Internet Crime Complaint Center (IC3). https://www.ic3.gov/CSA/2022/220818.pdf
Verizon Enterprise Solutions. (2019). 2019 data breach investigations report. https://www.key4biz.it/wp-content/uploads/2019/05/2019-data-breach-investigations-report.pdf
Kumari, M., Sinha, P. C., & Priya, S. (2014). The impact of data breaches on consumer trust in e-commerce. International Journal of Computer Science Publication (IJCSP). https://rjpn.org/ijcspub/papers/IJCSP14D1001.pdf
Merchant Risk Council. (2021). Top 10 North American bank eliminates credential stuffing. Merchant Risk Council. https://merchantriskcouncil.org/learning/resource-center/fraud/attack-types/top-10-north-american-bank-eliminates-credential-stuffing
Kaspersky Lab. (2015). Damage control: The cost of security breaches. https://media.kaspersky.com/pdf/it-risks-survey-report-cost-of-security-breaches.pdf
DOT Security. (2024). SIM swapping: How hackers beat multi-factor authentication. DOT Security. https://dotsecurity.com/insights/blog-sim-swapping-attacks
Dayanand, W. Jeberson, & Jeberson, K. (2024). Attack vectors and vulnerabilities: Investigating the methodologies employed by attackers to bypass CAPTCHA mechanisms, including machine learning-based algorithms, optical character recognition (OCR) techniques, and adversarial attacks. International Research Journal of Multidisciplinary Scope, 5(3). https://doi.org/10.47857/irjms.2024.v05i03.0828
Ezugwu, A., et al. (2023). Password-based authentication and the experiences of end users. Scientific African, 21. https://doi.org/10.1016/j.sciaf.2023.e01743
Yogeshwari, Kumudavalli, K., Aruna Devi, A., & Srivatsala, K. (2024). Transitioning from reactive to proactive cybersecurity using machine learning. International Research Journal on Advanced Engineering and Management (IRJAEM, 2(8).
NPCore. (2024). The limitations of multi-factor authentication (MFA): 2024 NPCore monthly technical white paper. https://www.npcore.com/upload/2024-08-14_17_17_38c4f0f59efb7945dbaf6773df6f21b544.pdf
Wadhwa, M., Prasad, B. K., Ranjan, S., & Kathuria, M. (2020). CAPTCHA bypass and prevention mechanisms: A review. International Organization of Scientific Research Journal of Computer Engineering, 22(3), 23–29. https://www.iosrjournals.org/iosr-jce/papers/Vol22-issue3/Series-4/D2203042329.pdf
Arya, S., Arya, S., Arya, M., & Arya, J. S. (2023). Enhancing IoT security and user experience: Leveraging SGIoT-SURE for effective security implementations. 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON, 224–229. https://doi.org/10.1109/UEMCON59035.2023.10316161
Shah, V. (2022, December). Machine learning algorithms for cybersecurity: Detecting and preventing threats. ResearchGate. https://www.researchgate.net/publication/378396020_Machine_Learning_Algorithms_for_Cybersecurity_Detecting_and_Preventing_Threats
Thawait, N. K. (2024). Enhancing cybersecurity through machine learning applications: A comprehensive study. Preprints. https://doi.org/10.20944/preprints202411.0390.v1
Thawait, N. K. (2024, May). Machine learning in cybersecurity: Applications, challenges and future directions. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10(3), 16–27. https://doi.org/10.32628/CSEIT24102125
Rees-Pullman, S. (2020, July). Is credential stuffing the new phishing? Computer Fraud & Security, 2020(7), 16–19. https://doi.org/10.1016/S1361-3723(20)30076-2
Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley, P. G., Invernizzi, L., Benko, B., Pietraszek, T., Patel, S., Boneh, D., & Bursztein, E. (2019). Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium.
Pal, B., Daniel, T., Chatterjee, R., & Ristenpart, T. (n.d.). Beyond credential stuffing: Password similarity models using neural networks. Cornell Tech. https://www.cs.cornell.edu/~rahul/papers/ppsm.pdf
Konduru, S. S., & Mishra, S. (2023). Detection of password reuse and credential stuffing: A server-side approach. Shiv Nadar Institution of Eminence. https://eprint.iacr.org/2023/989.pdf
Wang, K. C., & Reiter, M. K. (2019). Detecting stuffing of a user's credentials at her own accounts. ResearchGate. https://www.researchgate.net/publication/338158173_Detecting_stuffing_of_a_user's_credentials_at_her_own_accounts
Zhang, Q. (2021). Detecting credential stuffing between servers. In Security, Privacy, and Anonymity in Computation, Communication, and Storage (pp. 492–506). Springer. https://doi.org/10.1007/978-3-030-68884-4_38
Nguyen Ba, M. H., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A case study of credential stuffing attack: Canva data breach. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), 735–740. https://doi.org/10.1109/CSCI54926.2021.00187
Kamoun, F., Iqbal, F., Esseghir, M. A., & Baker, T. (2020). AI and machine learning: A mixed blessing for cybersecurity. 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1–7.
Singer, Y. (2024). AI & machine learning in cybersecurity.
Nassif, A. B., Talib, M. A., Nasir, Q., & Dakalbab, F. M. (2021). Machine learning for anomaly detection: A systematic review. IEEE Access, 9, 78658–78700. https://doi.org/10.1109/ACCESS.2021.3083060
Basak, S., Chatterjee, P., Biswas, D., Bhadra, P., & Das, R. (2024). Introduction to AI and ML technologies and their potential applications in cybersecurity. Advances in Web Technologies and Engineering, 277–309. https://doi.org/10.4018/979-8-3693-6557-1.ch012
Dokur, N. B. (2023). Artificial intelligence (AI) applications in cyber security. https://www.researchgate.net/publication/367253331_Artificial_Intelligence_AI_Applications_in_Cyber_Security
Usman, U. B., Mohammed, A., Ali, U., Habu, A., & Others. (2023). An overview of artificial intelligence in cybersecurity: Opportunities and challenges. https://www.researchgate.net/publication/375497186
Chen, Z., Duan, J., Kang, L., & Qiu, G. (2022). Supervised anomaly detection via conditional generative adversarial network and ensemble active learning. IEEE Transactions on Pattern Analysis and Machine Intelligence, PP(99). https://doi.org/10.1109/TPAMI.2022.3225476
Xin, Y., Zhang, X., Li, Y., Chen, L., & Liu, J. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365-35381. https://doi.org/10.1109/ACCESS.2018.2836950
Kim, J., Song, M., Seo, M., Jin, Y., & Shin, S. (2024). PassREfinder: Credential stuffing risk prediction by representing password reuse between websites on a graph. In 2024 IEEE Symposium on Security and Privacy (SP) (pp. 1385-1404). IEEE. https://doi.org/10.1109/SP54263.2024.00020
Saxena, S. (2022). Credential stuffing attack: Countermeasures using patterns and machine learning. International Research Journal of Engineering and Technology (IRJET), 9(9). https://www.irjet.net
Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789–33795. https://doi.org/10.1109/ACCESS.2018.2841987
Pal, B. (2014). Support vector machine and random forest modeling for intrusion detection system (IDS). Journal of Intelligent Learning Systems and Applications, 6(1).
Bierbrauer, D., Chang, A., Kritzer, W., & Bastian, N. (2021, November). Cybersecurity anomaly detection in adversarial environments. https://www.researchgate.net/publication/351624397_Cybersecurity_Anomaly_Detection_in_Adversarial_Environments
El Hairach, M. L., Bellamine, I., & Tmiri, A. (2023, December). Anomaly detection in PV modules: A comparative study of DBSCAN, k-means, Isolation Forest, and LOF. In 2023 7th IEEE Congress on Information Science and Technology (CiSt). IEEE.
A CNN-LSTM hybrid model. (2021). Journal of Cybersecurity and Privacy, 7(4), 123-134.
Kim, J., & Lee, S. (2020). Sequential pattern recognition for cybersecurity: LSTM-based attack detection. IEEE Transactions on Neural Networks and Learning Systems, 31(8), 3056-3068.
Liu, H., Li, Z., & Zhang, X. (2019). Semi-supervised learning for credential-stuffing detection with limited labeled data. International Journal of Cybersecurity, 15(3), 213-225
Zhao, F., & Xu, J. (2020). Leveraging unlabeled data in semi-supervised models for fraud detection. Journal of Machine Learning Research, 21(49), 1-22.
Afolabi, O. (2024). Using reinforcement learning for adaptive security protocols. https://www.researchgate.net/publication/384608149_USING_REINFORCEMENT_LEARNING_FOR_ADAPTIVE_SECURITY_PROTOCOLS
Boahen, E. K., Sosu, R. N. A., Ocansey, S. K., Xu, Q., & Wang, C. (2024). ASRL: Adaptive Swarm Reinforcement Learning for enhanced OSN intrusion detection. IEEE Transactions on Information Forensics and Security, 19, 10258–10272. https://ieeexplore.ieee.org/document/10741305
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Vasilakos, A. V. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381.
Kim, J., Song, M., Seo, M., Jin, Y., & Shin, S. (2024). PassREfinder: Credential stuffing risk prediction by representing password reuse between websites on a graph. *2024 IEEE Symposium on Security and Privacy (SP)*, 1385–1404.
Kamoun, F., Iqbal, F., Esseghir, M.A., & Baker, T. (2020). AI and machine learning: A mixed blessing for cybersecurity. 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1-7.
Nguyen Ba, M. H., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A case study of credential stuffing attack: Canva data breach. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), 735–740.
hapliyal, V., & Thapliyal, P. (2024). Machine learning for cybersecurity: Threat detection, prevention, and response. Digital Intelligence Research Applications, 12(1).
Arkose Labs. (n.d.). Credential stuffing attacks: What they are and how to prevent them. https://www.arkoselabs.com/credential-stuffing/credential-stuffing-attacks/
Aminu, M., Akinsanya, A., Oyedokun, O., & Dako, A. (2024). Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms. International Journal of Computer Applications Technology and Research, 13(08), 11-27.
Zhou, Y., & Chen, X. (2022). Real-time detection of compromised credentials in credential stuffing attacks. International Journal of Information Security, 21(5), 649-664.
Incyber. (2024). Predictive analytics in cybersecurity: Myth or reality? INCYBER NEWS. https://incyber.org/en/
MIT News. (2016, April 18). AI system predicts 85 percent of cyberattacks using input from human experts. MIT. https://news.mit.edu/2016/ai-system-predicts-85-percent-cyber-attacks-using-input-human-experts-0418
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, 305-320.
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.
Shabtai, A., Moskovitch, R., Elovici, Y., & Glezer, C. (2012). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report, 14(1), 16–29. https://doi.org/10.1016/j.istr.2009.03.003
Wei, J., Peng, W., Luo, J., & Wang, Y. (2020). Adaptive multi-factor authentication system based on contextual data. Future Generation Computer Systems, 108, 715–728. https://doi.org/10.1016/j.future.2020.03.032
Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014). The tangled web of password reuse. Proceedings of NDSS. https://www.ndss-symposium.org/ndss2014/tangled-web-password-reuse
Anderson, R. J., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016
Zou, D., Tuo, J., Hao, F., Li, B., & Chen, H. (2020). Building anomaly detection systems with active learning: A comparative study. Computers & Security, 93, 101748. https://doi.org/10.1016/j.cose.2020.101748
Radford, A., Narasimhan, K., Salimans, T., & Sutskever, I. (2018). Improving language understanding by generative pretraining. OpenAI Technical Report. https://cdn.openai.com/research-covers/language-unsupervised/language_understanding_paper.pdf
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119.
European Parliament & Council of the European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L 119, 1-88.
Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review Online, 64, 63–69.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy (SP), 305–316. https://doi.org/10.1109/SP.2010.25
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016
Zou, D., Tuo, J., Hao, F., Li, B., & Chen, H. (2020). Building anomaly detection systems with active learning: A comparative study. Computers & Security, 93, 101748. https://doi.org/10.1016/j.cose.2020.101748
Anderson, R. J., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., ... & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1-210. https://doi.org/10.1561/2200000083
Wei, J., Peng, W., Luo, J., & Wang, Y. (2020). Adaptive multi-factor authentication system based on contextual data. Future Generation Computer Systems, 108, 715–728. https://doi.org/10.1016/j.future.2020.02.014
Shabtai, A., Moskovitch, R., Elovici, Y., & Glezer, C. (2009). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep., 14, 16-29.
McMahan, B., Moore, E., Ramage, D., Hampson, S., & Arcas, B. A. Y. (2017). Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR 54, 1273-1282. https://proceedings.mlr.press/v54/mcmahan17a.html
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., Bonawit, K., Charles, Z., Cormode, G., Cummings, R., D’Oliveira, R. G. L., Eichner, H., El Rouayheb, S., Evans, D., Gardner, J., Garrett, Z., Gascón, A., Ghazi, B., Gibbons, P. B., ... Zhao, S. (2021). Advances and open problems in federated learning. https://ieeexplore.ieee.org/document/9464278
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213–238
Ndung'u, R. N. (2022). Blockchain as a solution of information security and data privacy issues: Review. International Journal of Computer Applications Technology and Research, 11(08), 337–340.
Kasula, V. K., Kumar, S., & Reddy, A. R. (2023). Fortifying cloud environments against data breaches: A novel AI-driven security framework. ResearchGate. Retrieved from https://www.researchgate.net/publication/385213953_Fortifying_cloud_environments_against_data_breaches_A_novel_AI-driven_security_framework
Advanced AI Authentication Mechanisms for Securing Financial Services. (2023). International Journal of Advanced Engineering and Management, 10(3), 45–53.
Li, J., Meng, Y., Ma, L., Du, S., Zhu, H., & Pei, Q. (2021). A federated learning based privacy-preserving smart healthcare system. IEEE Transactions on Industrial Informatics, 17(9), 6530–6541.
Lemley, M. A., & Volokh, E. (2019). Law, virtual reality, and augmented reality. UCLA Law Review, 66, 1032–1085.
Anakal, S., K. Krishna Prasad, Chandrashekhar Uppin, & M. Dileep Kumar. (2025). Diagnosis, visualisation and analysis of COVID-19 using Machine learning. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.826
J. Prakash, R. Swathiramya, G. Balambigai, R. Menaha, & J.S. Abhirami. (2024). AI-Driven Real-Time Feedback System for Enhanced Student Support: Leveraging Sentiment Analysis and Machine Learning Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.780
S. Lakshminarayanan and J. Konidhala, (2024). CONVOLUTIONAL NEURAL NETWORK FOR POTHOLE IDENTIFICATION IN URBAN ROADS”, IJASIS, 10(1);1–12, doi: 10.29284/ijasis.10.1.2024.1-12.
K. Tamilselvan, , M. N. S., A. Saranya, D. Abdul Jaleel, Er. Tatiraju V. Rajani Kanth, & S.D. Govardhan. (2025). Optimizing data processing in big data systems using hybrid machine learning techniques. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.936
Ponugoti Kalpana, L. Smitha, Dasari Madhavi, Shaik Abdul Nabi, G. Kalpana, & Kodati , S. (2024). A Smart Irrigation System Using the IoT and Advanced Machine Learning Model: A Systematic Literature Review. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.526
K. Machap and S. R. Narani, (2024). IOT AUDIO SENSOR NETWORKS AND DECISION TREES FOR ENHANCED RAIN SOUND CLASSIFICATION, IJASIS, 10(1);35–44, Jun. doi: 10.29284/ijasis.10.1.2024.35-44.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.