Blacklisted Password Authentication System

Authors

  • Payal Department of CSE, DCRUST, Murthal, India
  • Sangwan S Department of CSE, DCRUST, Murthal, India
  • Malik A Department of CSE, DCRUST, Murthal, India

DOI:

https://doi.org/10.26438/ijcse/v7i6.633635

Keywords:

Brute force Attack, Dictionary Attack, Authentication, Blacklisted Password

Abstract

Passwords have always been one of the simplest security methods, weak passwords, default passwords can easily be cracked using brute force attack and dictionary attack which is very dangerous for security of systems across the globe. Security and privacy issues are the challenges faced in many systems. Blacklisted Password Authentication System is an attempt to decrease the efficiency of Dictionary, Brute force Attack which can be implemented in any authentication system without any significant changes.

References

[1] Yan Zhao, Shiming Li, et al. “Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.” Hindawi Security and Communication Networks , 2018.

[2] Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer Society IEEE. pp. 80-84, 2017.

[3] Antonakakis, Manos, et al. "Understanding the mirai botnet." 26th USENIX Security Symposium. pp. 1093-1110, 2017.

[4] Ari Juels, et al. “Honeywords: Making Password-Cracking Detectable”, ACM, pp. 145-156, 2013.

[5] Vasundhara R.Pagar, Rohini G.Pise, “Strengthening Password Security through Honeyword and HoneyEncryption Technique”, IEEE, pp. 827-831, 2017.

[6] Sohaib Khan, Fawad Khan, “Attempt based Password”, in Proceedings of 13th International Bhurban Conference on Applied Science and Technology. IEEE, pp. 300-304, 2016.

[7] C.E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, pp. 379-423, 1948.

[8] Taha, Mariam M., et al. "On password strength measurements: Password entropy and password quality." In ICCEEE, IEEE, 2013.

[9] Wantong Zheng, et al. “CombinedPWD: A New Password Authentication Mechanism using Separators between Keystrokes”, 13th ICCIS Conference IEEE, pp. 557-560, 2017.

[10] Aakansha Gokhale,et al., “A Study of Various Passwords Authentication Techniques” International Journal of Computer Applications(0975–8887) International Conference on Advances in Science and Technology (ICAST), 2014

[11] Pa, Yin Minn Pa, et al. "Iotpot: A novel honeypot for revealing current iot threats." Journal of Information Processing 24.3, pp. 522-533,2016.

[12] John the Ripper password cracker, http://www.openwall.com/john/.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.633635
Published: 2019-06-30

How to Cite

[1]
Payal, S. Sangwan, and A. Malik, “Blacklisted Password Authentication System”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 633–635, Jun. 2019.

Issue

Section

Research Article