Preview

Password Guessing Attack

Good Essays
Open Document
Open Document
11810 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Guessing Attack
128

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,

VOL. 9,

NO. 1, JANUARY/FEBRUARY 2012

Revisiting Defenses against Large-Scale Online Password Guessing Attacks
Mansour Alsaleh, Mohammad Mannan, and P.C. van Oorschot, Member, IEEE
Abstract—Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this paper, we discuss the inadequacy of existing and proposed login protocols designed to address largescale online dictionary attacks (e.g., from a botnet of hundreds of thousands of nodes). We propose a new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from unknown remote hosts to as low as a single attempt per username, legitimate users in most cases (e.g., when attempts are made from known, frequently-used machines) can make several failed login attempts before being challenged with an ATT. We analyze the performance of PGRP with two real-world data sets and find it more promising than existing proposals. Index Terms—Online password guessing attacks, brute force attacks, password dictionary, ATTs.

Ç
1 INTRODUCTION
NLINE guessing

O

attacks on password-based systems are inevitable and commonly observed against web applications and SSH logins. In a recent report, SANS [20] identified password guessing attacks on websites as a top cyber security risk. As an example of SSH passwordguessing attacks, one experimental Linux honeypot setup has been reported [18] to suffer on average 2,805 SSH malicious login attempts per computer per day (see also [8]). Interestingly, SSH servers that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    on each other and Great Britain for certain goods they could not provide for themselves.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    How does Susan Hill create tension and unease in the first 3 chapters of the novel,…

    • 492 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As we already know Fullsoft Inc, has recently experienced a malware attack that has resulted in proprietary information being leaked. Even though the company is now in the process of this breach being recovered, we will need to come up with a plan so we can prevent such incident of happening again.…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Therapeutic Exercises

    • 565 Words
    • 3 Pages

    Does your stomach move outward and become emphasized when you stand up? Moreover, do you also have a forward head and a hunched upper back? In that case, you most likely have swayback posture, which is mainly due to tight hip flexors. Even worse, it ruins not only your body form but also may cause long-term physical complications. However, you are quite capable of correcting this posture with a few therapeutic exercises.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are a few real ways to hack into online accounts, and there are many fake ways you will see all over the internet. Most of these fake ways tell you something like “you need to send an email to account_recovery@yahoo.com your username/password in the subject line” which is some fake Yahoo account owned by some guy that just stole your password.…

    • 504 Words
    • 3 Pages
    Good Essays

Related Topics