2021
DOI: 10.1016/j.jnca.2021.103080
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and defenses in user authentication systems: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
43
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 59 publications
(46 citation statements)
references
References 151 publications
3
43
0
Order By: Relevance
“…It indicates that every two attempts will succeed in breaking through the authentication system. It makes our attack more realistic than the existing works as a real-world authentication system usually allows three attempts [43]. We also find almost no difference in the FARs of the mean-treated rPPG signal for the three states, indicating that the mean-treatment reduces the influence noise on the signal.…”
Section: Attack Success Rates In Different Statesmentioning
confidence: 75%
“…It indicates that every two attempts will succeed in breaking through the authentication system. It makes our attack more realistic than the existing works as a real-world authentication system usually allows three attempts [43]. We also find almost no difference in the FARs of the mean-treated rPPG signal for the three states, indicating that the mean-treatment reduces the influence noise on the signal.…”
Section: Attack Success Rates In Different Statesmentioning
confidence: 75%
“…This means that all unused ports should be closed and only allow one that is secure and needed to communicate with other devices to be left open. In the case of brute-force attacks, one such method that is mentioned by both Kirushnaamoni [66] and Wang et al [67] are implementing the use of account locking in sessions. This is where password insertion for authentication is given a limited number of times.…”
Section: Prevention and Mitigation Strategiesmentioning
confidence: 99%
“…Graphical passwords are introduced to mitigate some vulnerabilities in text-based passwords. This method is resistant to attacks such as dictionary attacks because of its large password space [ 13 ].…”
Section: Introductionmentioning
confidence: 99%