Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,969 Hits in 4.3 sec

An Explainable Password Strength Meter Addon via Textual Pattern Recognition

Ming Xu, Weili Han
2019 Security and Communication Networks  
Textual passwords are still dominating the authentication of remote file sharing and website logins, although researchers recently showed several vulnerabilities about this authentication mechanism.  ...  According to our evaluation and user study, our PSM addon, which leverages textual pattern passwords, can effectively detect these popular patterns and effectively help users create securer passwords.  ...  Afterward, we present the evaluation, as well as the results of our proportion analysis of pattern passwords in Section 4. Then, we provide a user study and its analysis in Section 5.  ... 
doi:10.1155/2019/5184643 fatcat:5ihzmqnmfvaqhjwdafkv4gdg44

A General Framework to Understand Vulnerabilities in Information Systems

Xiong Zhang, Haoran Xie, Hao Yang, Hongkai Shao, Minghao Zhu
2020 IEEE Access  
The experimental results show that the general framework helps characterize the modes and patterns of various types of vulnerabilities.  ...  This study contributes to the security literature by providing a deeper understanding of the characteristics of vulnerabilities and their related suggested solutions.  ...  In addition, the analysis of topic 2 indicates that weak passwords and exposed passwords should be modified immediately in the case of an SQL injection.  ... 
doi:10.1109/access.2020.3006361 fatcat:4f3pxloiirgkbkqwjqdafoznbe

An Analysis of Hybrid Authentication and Authorization Model for Web Based Application

Harish Baraithiya, RK Pateriya
2017 Journal of Information Technology & Software Engineering  
This research having analysis of hybrid authentication and authorization model for secure and user-friendly web-based applications.  ...  Weili H [2] research shows that comprehensively study on the differences between passwords from English and Chinese web domain users.  ...  Han W [2] Regional Patterns and Vulnerability Analysis of Chinese Web Passwords It sheds light on understanding the impact of regional patterns on passwords.  ... 
doi:10.4172/2165-7866.1000215 fatcat:lyhzdgoxkbfqlgillj7lnuh5vy

Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study

Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han
2021 Security and Communication Networks  
We get some interesting observations that make sense of many cracking behaviors and come up with some suggestions on how to choose a more effective password-cracking method under these two offline cracking  ...  Then, we perform further evaluation by analyzing the set of cracked passwords in each targeting dataset.  ...  Acknowledgments is work was supported in part by National Natural Science Foundation of China (Nos. 61632020, U1936209, 62002353, and U1836207) and Beijing Natural Science Foundation (No. 4192067).  ... 
doi:10.1155/2021/5563884 doaj:13d5860000674dc89ceb085662db32d4 fatcat:rauwnnaienc6hoxclsgclzmr34

A study on usability and security features of the Android pattern lock screen

Panagiotis Andriotis, George Oikonomou, Alexios Mylonas, Theo Tryfonas
2016 Information and Computer Security  
Graphical passwords are vulnerable to attacks (e.g. shoulder surfing), thus the need for more complex passwords becomes apparent.  ...  In this paper, we focus on the features that constitute a usable and secure pattern and investigate the existence of heuristic and physical rules that possibly dictate the formation of a pattern.  ...  Studies showed that despite their large 'password space', users tend to select specific regions on the images (Thorpe and van Oorschot, 2007) .  ... 
doi:10.1108/ics-01-2015-0001 fatcat:egsqilhdgzebppg4jb2pbamp7m

A survey on the use of graphical passwords in security

Haichang Gao, Wei Jia, Fei Ye, Licheng Ma
2013 Journal of Software  
In this paper, we focus on the security aspects of existing graphical password schemes, which not only gives a simple introduction of attack methods but also intends to provide an in-depth analysis with  ...  The paper first categorizes existing graphical password schemes into four kinds according to the authentication style and provides a comprehensive introduction and analysis for each scheme, highlighting  ...  This research was supported by the National Natural Science Foundation of China (60903198) and the Fundamental Research Funds for the Central Universities.  ... 
doi:10.4304/jsw.8.7.1678-1698 fatcat:ssobdkvc3bfd3edvr6wb6fuhva

A Systematic Review on Password Guessing Tasks

Wei Yu, Qingsong Yin, Hao Yin, Wei Xiao, Tao Chang, Liangliang He, Lulin Ni, Qingbing Ji
2023 Entropy  
Further, we discuss the open challenges of password guessing in terms of diverse application scenarios, guessing efficiency, and the combination of traditional and deep learning methods.  ...  Finally, this review presents future research directions to guide successive research and development of password guessing.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e25091303 pmid:37761602 pmcid:PMC10528539 fatcat:b2cttszefndw5nriaarpbonkvq

Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security

Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt, Mohammad Hijji, Khan Muhammad
2022 Mathematics  
With the rapid advancement in information technology and excessive use of social media in our daily lives, more public information sources are available than ever before.  ...  Extracting relevant information from pools of massive public information sources is a large task.  ...  Funding: This research received funding from the Norwegian University of Science and Technology.  ... 
doi:10.3390/math10122054 fatcat:rsmy445egjhbbk7kqmwf26dbtq

Passblot: A Highly Scalable Graphical one Time Password System

Sainath Gupta
2012 International journal of network security and its applications  
Properties of one time passwords ensure the resistance towards various common attacks and the uniqueness of human perception makes it usable.  ...  It generates pseudo random one time passwords using a set of inkblots, unique to each user.  ...  Jeremy Elson of Microsoft for allowing us to use the images. Mr. Rohit A Khot for being an inspiration for my research.  ... 
doi:10.5121/ijnsa.2012.4215 fatcat:qm3gcndeozb5rpqa6inwnb2yr4

Hackers Topology Matter Geography

Amit Rechavi, Tamar Berenblum, David Maimon, Ido Sivan Sevilla
2015 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 - ASONAM '15  
We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks.  ...  Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology.  ...  ACKNOWLEDGEMENT This research was conducted with the support of the Israeli Ministry of Science, Technology and Space (grant number 3-10888) and the college of behavioral and Social Science at the university  ... 
doi:10.1145/2808797.2808873 dblp:conf/asunam/RechaviBMS15 fatcat:lhk5an76hvev5gvewvpsdm4rpe

IEEE Access Special Section Editorial: Scalable Deep Learning for Big Data

Liangxiu Han, Daoqiang Zhang, Omer Rana, Yi Pan, Sohail Jabbar, Mazin Yousif, Moayad Aloqaily
2020 IEEE Access  
He is a member of the Machine Learning Society of the Chinese Association of Artificial Intelligence (CAAI) and the Artificial Intelligence and Pattern Recognition Society of the China Computer Federation  ...  His research interests include machine learning, pattern recognition, data mining, and medical image analysis.  ... 
doi:10.1109/access.2020.3041166 fatcat:zkzdnzk22jge3l5mwju3j42mcu

SSH Honeypot: Building, Deploying and Analysis

Harry Doubleday, Leandros Maglaras, Helge Janicke
2016 International Journal of Advanced Computer Science and Applications  
The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon.  ...  This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods.  ...  of the techniques and patterns that attackers tend to follow.  ... 
doi:10.14569/ijacsa.2016.070518 fatcat:6wlpmic2nvbi3ickcv54z5trv4

A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks

Diana Florea, Wayne Patterson
2021 International Journal of Advanced Computer Science and Applications  
Our proposed method works its argument on a set of Eastern European languages but is applicable to a large(r) range of languages and/or probabilistic patterns, being characterized by usage of limited resources  ...  In this study we explore the possibility of real-time detection of ransomware source through a linguistic analysis that examines machine translation relative to the Levenshtein Distance and may thereby  ...  ACKNOWLEDGMENT The authors are grateful for the contributions and assistance provided by Professor Silvia Florea of the Lucian Blaga University of Sibiu, Romania.  ... 
doi:10.14569/ijacsa.2021.0121158 fatcat:3fbcy22jgjhb7coul55qmqljdi

Evaluating authentication options for mobile health applications in younger and older adults

Kelly Grindrod, Hassan Khan, Urs Hengartner, Stephanie Ong, Alexander G. Logan, Daniel Vogel, Robert Gebotys, Jilan Yang, Muhammad Khurram Khan
2018 PLoS ONE  
Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipestyle fingerprints.  ...  Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time.  ...  For example, Renaud and Ramsay [22] have proposed and evaluated a graphical password scheme for web services.  ... 
doi:10.1371/journal.pone.0189048 pmid:29300736 pmcid:PMC5754080 fatcat:rylkyeuthnf55orofynd3fd3g4

PCIEF: a policy conflict identification and evaluation framework

Vimalathithan Subramanian, Remzi Seker, Srini Ramaswamy, Rathinasamy B. Lenin
2012 International Journal of Information and Computer Security  
His research interests include behaviour modelling, analysis and simulation, software stability and scalability -particularly in the design and development of better software systems, and intelligent and  ...  When computer-based technologies become commodities on which people rely, the vulnerability of the society to these technologies increase as well.  ...  to region.  ... 
doi:10.1504/ijics.2012.051090 fatcat:2ocbshhlm5h2blnxc4bhqvyqzi
« Previous Showing results 1 — 15 out of 1,969 results