2017 International Symposium on Electronics and Smart Devices (ISESD) 2017
DOI: 10.1109/isesd.2017.8253295
|View full text |Cite
|
Sign up to set email alerts
|

Improved hashing and honey-based stronger password prevention against brute force attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 1 publication
0
4
0
2
Order By: Relevance
“…User Login, When the user attempts login to his account, the login server checks the honeypot (Fake and legitimate accounts, the fake is set up by the administrator to detect the breaches) [33][34][35]. If his/her account is fakes then an alarm is sent to the administrative as a possible breach, else the account is legitimate then hashed the password of the user and compared to its database of sweetwords and sent (Check: i, j) to the honeychecker [36,37].…”
Section: Honeywordsmentioning
confidence: 99%
“…User Login, When the user attempts login to his account, the login server checks the honeypot (Fake and legitimate accounts, the fake is set up by the administrator to detect the breaches) [33][34][35]. If his/her account is fakes then an alarm is sent to the administrative as a possible breach, else the account is legitimate then hashed the password of the user and compared to its database of sweetwords and sent (Check: i, j) to the honeychecker [36,37].…”
Section: Honeywordsmentioning
confidence: 99%
“…e adversary has at least a (1-(1/k)) chance of picking a honeyword if the honeyword is as flat as possible (i.e., 1/k flat) [25,26]. For example, in the complete flat honeywords, if the sweetwrods k � 25, the adversary has a (1/25 � 4%) chance of selecting a sugarword and a (1-4% � 96%) for selecting a honeyword [27].…”
Section: Honeywordsmentioning
confidence: 99%
“…String password lebih sering disimpan dalam bentuk hash, yakni metode enkripsi dengan skema satu arah. Artinya string password yang telah di-hash tidak dapat diketahui nilai aslinya [2].…”
Section: Pendahuluanunclassified
“…Brute force dilakukan dengan melakukan percobaan kombinasi username dan password yang sudah dimiliki dalam word-lists sampai mendapatkan response "true" dari sesi login. Brute force dilakukan secara otomatis oleh program, dengan membaca dan mengirim kombinasi username dan password setiap interval waktu tertentu [2], [3].…”
Section: Pendahuluanunclassified