Blacklisted Password Authentication System
DOI:
https://doi.org/10.26438/ijcse/v7i6.633635Keywords:
Brute force Attack, Dictionary Attack, Authentication, Blacklisted PasswordAbstract
Passwords have always been one of the simplest security methods, weak passwords, default passwords can easily be cracked using brute force attack and dictionary attack which is very dangerous for security of systems across the globe. Security and privacy issues are the challenges faced in many systems. Blacklisted Password Authentication System is an attempt to decrease the efficiency of Dictionary, Brute force Attack which can be implemented in any authentication system without any significant changes.
References
[1] Yan Zhao, Shiming Li, et al. “Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.” Hindawi Security and Communication Networks , 2018.
[2] Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer Society IEEE. pp. 80-84, 2017.
[3] Antonakakis, Manos, et al. "Understanding the mirai botnet." 26th USENIX Security Symposium. pp. 1093-1110, 2017.
[4] Ari Juels, et al. “Honeywords: Making Password-Cracking Detectable”, ACM, pp. 145-156, 2013.
[5] Vasundhara R.Pagar, Rohini G.Pise, “Strengthening Password Security through Honeyword and HoneyEncryption Technique”, IEEE, pp. 827-831, 2017.
[6] Sohaib Khan, Fawad Khan, “Attempt based Password”, in Proceedings of 13th International Bhurban Conference on Applied Science and Technology. IEEE, pp. 300-304, 2016.
[7] C.E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, pp. 379-423, 1948.
[8] Taha, Mariam M., et al. "On password strength measurements: Password entropy and password quality." In ICCEEE, IEEE, 2013.
[9] Wantong Zheng, et al. “CombinedPWD: A New Password Authentication Mechanism using Separators between Keystrokes”, 13th ICCIS Conference IEEE, pp. 557-560, 2017.
[10] Aakansha Gokhale,et al., “A Study of Various Passwords Authentication Techniques” International Journal of Computer Applications(0975–8887) International Conference on Advances in Science and Technology (ICAST), 2014
[11] Pa, Yin Minn Pa, et al. "Iotpot: A novel honeypot for revealing current iot threats." Journal of Information Processing 24.3, pp. 522-533,2016.
[12] John the Ripper password cracker, http://www.openwall.com/john/.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
