International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 259

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017 | Popularity: 6.8 / 10


     

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale


Abstract: For secured websites, the password based authentication is frequently used approach for authenticating the end user before granting the access. The growing use of password based authentication approach at increasing websites leads to the important issue of possibility of password reuses among accounts of various websites or similar websites. Additionally, the recent study on numerous high profile password hacking claims that password situation is not better. Under such cases, there is huge possibility of shadow attacks in which an attacker can successfully compromise the account that reuses the password of other accounts those are from similar website or different websites. The reuse of passwords for different accounts under same website is called as Intra-Site Password Reuses (ISPR). The reuse of passwords for different accounts under different websites is called as Cross-Site Password Reuses (CSPR). Therefore in order to prevent such shadow attacks on passwords, first we need to understand and examine the both ISPR and CSPR based on publically available password datasets. However, there is no in-depth empirical study conducted in literature except the one very recently introduced on Chinese password datasets However the problem with this method is that they are removing the duplicate profiles and passwords largely in their pre-processing step, this can reduces the scalability of password reuses.


Keywords: Pre-processing, Dataset, ISPR, CSPR


Edition: Volume 6 Issue 5, May 2017


Pages: 2530 - 2533



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Bhavika Garse, N. D. Kale, "Shadow Attacks Based On Password Patterns Password Reuses", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2530-2533, https://www.ijsr.net/getabstract.php?paperid=ART20173875, DOI: https://www.doi.org/10.21275/ART20173875



Similar Articles

Downloads: 91 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 0

Comparative Studies, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023

Pages: 194 - 199

A Comparative Study of Analyzing Breast Cancer as Benign or Malignant using Machine Learning Algorithms

Nigel Jonathan Renny, Timothy William Richard, Dr. M. Maheswari

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 1, January 2023

Pages: 131 - 141

Enhancing Fashion Image Retrieval with Multi-Modal Query and Zero-Shot Learning for Cross-Domain

Swathy S

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1028 - 1031

Machine Learning Approaches to Ambient Air Quality Prediction

Sweta

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 947 - 949

COVID-19 Prediction using Machine Learning Algorithms

Saily Suresh Patil

Share this Article
Top