A survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication


Comparative Analysis of Authentication Methods



Download 48,61 Kb.
bet6/6
Sana22.05.2023
Hajmi48,61 Kb.
#942481
1   2   3   4   5   6
Bog'liq
A Survey of Password Attacks and Compara (1)

Comparative Analysis of Authentication Methods: In Table 1 different password methods are comparatively highlighted in which it is tried to show that which password method or authentication scheme could resist against what type of attacks. The table also highlights method’s additional requirements, cost, processing time, protection level and method’s effect towards person’s metal condition.



Table 1: Analysis of authentication methods
Additional Hardware Mental Protection Processing



Method

Resistance to attacks

Requirement

Cost

attitude effects

level

Time

Conventio-nal password scheme

No




Normal




Low

Fast

Key stroke dynamics

Shoulder surfing, pishing, key loggers

No

Normal

Yes

Medium

Medium

Click patterns

Shoulder surfing, pishing, key loggers

No

Normal

Yes

Medium

Medium

Graphical passwords

Shoulder surfing

Yes

High

Yes

Medium

Slow

Biometrics

Shoulder surfing, pishing, key loggers etc

Yes

High

No

High

Slow

Authentication Panel

Video recording, shouldering

No

Normal

Yes

High

medium

Reformation Based

Brute force, video recording, shoudering

No

Normal

No

Medium

Fast




and dictionary attacks
















Moving Balls Based

Dictionary attacks, shouldering

No

Normal

Yes

High

medium

Expression Based

Brute force, video recording, shoudering

No

Normal

Yes

High

Fast




and dictionary attacks
















Virtual Passwords

Pishing, key loggers and all other

May be

May be high

No

Medium

Fast




online attacks
















Time Signature

Shoulder surfing, dictionary attacks,

No

Normal

Yes

High

Slow




replay attacks, key loggers etc


















CONCLUSION 7. Arvind Narayanan and Vitaly Shmatikov, 0000. Fast dictionary attacks on passwords using
Through this survey several things are concluded as time-space tradeoff, Conference on Computer and before adopting any password or authentication method, Communications Security, Proceedings of the 12th user must know the password attack and then user should ACM Conference on Computer and Communications apply appropriate solution. The user should apply the Security, pp: 364-372.
authentication method according to scenario because 8. Kessler, Gary C., 2002. Passwords - Strengths and some of the methods are applicable at stand alone system Weaknesses. Jan 1996. URL: http:// and some are applicable at online environments as over www.garykessler.net/library/password.html.
ATM and several internet services. Although several 9. Huanyu Zhao Xiaolin Li, 2007. A Scalable novel schemes described here provide protection against Shoulder-Surfing Resistant Textual-Graphical dictionary attacks, brute force attacks, video recording Password Authentication Scheme, Advanced attacks, spyware, shoulder surfing, phishing etc but in Information Networking and Applications

order to secure the system. Also different password Workshops, 2007, AINAW '07. 21st schemes can be merged together to form a single and Conference, 2(s): 467-472.
International

more secured password scheme. Such scheme can be the 10. Syverson, P., et al., 1994. A taxonomy of replay combinations of passwords schemes such as: attacks [cryptographic protocols], Proceedings of
Computer Security Foundations Workshop VII,
Conventional Passwords CSFW, 7(s): 187-191.
Conventional + Keystrokes Dynamics 11. Fahad Ikram, Muhammad Sharif and Mudassar Raza, Conventional + Click Patterns 2008. Protecting Users against Phishing Attacks in 7th
Biometrics + Conventional + Keystrokes CIIT Workshop on Research in Computing June 23,
Conventional + Memorable 2008 CIIT, Lahore - Pakistan.
12. Baig, M.M. and W. Mahmood, 2007. A Robust
REFERENCES Technique of Anti Key-Logging using Key-Logging Mechanism, Digital EcoSystems and Technologies

  1. Anand Sharma and Vibha Ojha, 2010. Password Conference, 2007. DEST '07. Inaugural IEEE-IES, based authentication: Philosophical Survey. IEEE. Feb 2007, (s): 314-318.

  2. Martinez-Diaz, M. and C. Martin-Diaz, 2010. A 13. Haider, S., A. Abbas and A.K. Zaidi, 2000. A Multi comparative evaluation of finger drawn graphical Technique Approach for User Identification through

password verification methods. 12th international Keystroke Dynamics, 2000 IEEE International
conference on frontiers in handwriting recognition Conference on Systems, Man and Cybernetics, 2010 Spain. 2(s): 1336-1341.

  1. Ilkka Uusitalo and Josep M. Catot, 2009. Phishing 14. Nick Bartlow and Bojan Cukic, 2006. Evaluating the and countermeasures in Spanish online Banking. Reliability of Credential Hardening through

3rd
International conference on emerging security Keystroke Dynamics, 17th International Symposium

information, System and Technologies. on Software Reliability Engineering, 2006. ISSRE
4 Ali, M. Eljetlawi and Norafia Ithnin, 2008. Graphical apos06 Nov.(s): 117-126.
password: Comprehensive study of the useability 15. Jarmo Ilonen1, 2003. Keystroke Dynamics, Advanced features of the recognition base graphical Topics in Information Processing 1 - Lectures, Wed password methods. 3rd International conference on Dec 10, 2003, http:// www.it.lut.fi/ kurssit/ 0304/ convergence and Hybrid Information Technology. 010970000/lectures.html.

  1. Fujita, K. and Y. Hirakawa, 2008. A study of 16. Enzhe Yu Sungzoon Cho, 2003. GA-SVM password authentication method against observing wrapper approach for feature subset selection in attacks. 6th International Symposium on Intelligent keystroke dynamics identity verification, Systems and Informatics, SISY 2008. Proceedings of the International Joint Conference

  2. Muhammad Sharif and Aman Ullah Khan, 2007. on Neural Networks, 2003. 3(s): 2253- 2257 Vol. 3 Benchmarking of PVM and LAM/MPI Using OSCAR, ISSN: 1098-7576.

Rocks and Knoppix Clustering Tools in ICCISSE 17. Tai-Hoon Cho, 2006. Pattern Classification 2007, XXI. International Conference on Computer, Methods for Keystroke Analysis, SICE-ICASE, Information and Systems Science and Engineering 2006. International Joint Conference Oct. 2006, May 25-27, 2007 Vienna, Austria. (s): 3812-3815.




  1. Attila Mészáros, Zoltán Bankó and László Czúni, 26. Fadhli Wong Mohd Hasan Wong Supian, A.S.M. 2007. Strengthening Passwords by Keystroke Ismail and A.F. Lai Weng Kin Ong Cheng Soon, 2001. Dynamics, IEEE International Workshop on Enhanced User Authentication through Typing Intelligent Data Acquisition and Advanced Biometric with Artificial Neural Networks and K- Computing Systems: Technology and Applications Nearest Neighbour Algorithm, Thirty-Fifth Asilomar 6-8 September 2007, Dortmund, Germany. Conference on Signals, Systems and Computers,

  2. Dalia Abdul Hadi Abdul Ameer and Ahmed 2001. 2(s): 911-915 Vol. 2, ISBN: 0-7803-7147-X. Abdulhakim Al-Absi, 2010. Anywhere On-Keyboard 27. Manabo Hirano and Tomohiro Umeda, 2009. T-PIM: Password Technique. IEEE Student conference on Trusted password Input method against data stealing Research and development 2010 Putrajaya Malaysia. Malware IEEE 6th International Conference on IT.

  3. Muhammad Sharif, Tariq Faiz and Mudassar Raza, 28. Hirotaka Tazawa and Takashi Katoh, 2010. A user 2008. Time Signatures - An Implementation of authentication scheme using Multiple Passphrases Keystroke and Click Patterns for Practical and Secure and its arrangements. ISITA Taiwan. Authentication, The third International Conference 29. Safdar, S., M.F. Hassan, M.A. Qureshi, R. Akbar and on Digital Information Management (IEEE ICDIM R. Aamir, 2010. Authentication model based on 2008), 13-16 November, 2008, University of east reformation mapping method “ International London, London UK. Conference on Information and Emerging

  4. Abdurazzag Ali Abura and Manal I. Al Fallah, 2008. Technologies (ICIET).

Password generator based on mouse clicks signal 30. Shakir, M. and Abdul Ayaz Khan, 2010. S3TFPAS: and screen cursor position. IEEE Proceedings of the Scalable shoulder surfing resistant Textual-Formula International Conference on Computer and base Password Authentication system. IEEE. Communication Engineering. 31. Shahid, M. and M.A. Qadeer, 2009. Novel scheme for

  1. Qurat-Ul-Ain Arshad, Muhammad Sharif, Mudassar securing passwords”. IEEE 3rd International

Raza and Aman Ullah Khan, 2007. Secured and Conference on Digital Ecosystems and Technologies, Handy Graphical Password System, National DEST '09.
Conference of Information and Communication 32. Mohammadi, S. and S.Z. Hosseini, 0000. Virtual Technologies (NCICT-2007), June 09, 2007, at Main password using Runge-kutta method for internet
Campus University of Science and Technology, banking. IEEE 2nd International Conference on
Bannu, NWFP, Pakistan. Communication Software and Networks.

  1. Mohd Ali Bin Mohd Isa and Mohd Nor Hajar Hasrol, 33. Qiang Wang and Zhiguang Qin, 2010. Stronger User

2008. User perception towards the use of colour as authentication for web browser. 3rd International
Authentication method: focus on FTMSK lecturer. conference on advance computer theory and Proceeding of the International Conference on engineering (ICACTE) China.
Computer and Communication Engineering Malaysia. 34. http://www.datadoctor.ws/disk-data-recovery/

  1. Varun Kacholia and Shashank Pandit, 2003. Biometric keylogger.html.

Authentication Using Random Distribution 35. http://newsdesk.si.edu/images_full/images/museums (BioART), Canadian IT Security Symposium (CITSS) /nmah/treasures/morse_telegraph_ key. jpg.

  1. Ahmed, A.A.E. and I. Traore, 2005. Anomaly Intrusion Detection Based on Biometrics, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW '05.







Download 48,61 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish