Académique Documents
Professionnel Documents
Culture Documents
attack,
INT RODUCTION
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 8
II.
BASIC TERMS
A.
Password Cracking
Phishing
Social engineering
Malware
Offline cracking
Shoulder surfing
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 9
Spidering
Guessing
Replay attacks
Key logger
Cracking Tools
Brutus
Rainbow crack
Wfuzz
COMPARISON STUDY
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 10
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 11
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 12
Bio metric password entering rhythm of
individual users
Advantages of key stroke dynamics include that
no need of extra hardware, only good
programming skills are required to imp lement
such authentication system. It resists to
password attacks like shoulder surfing, phishing,
key loggers etc. Also the attacker cannot get
into the system even if he/she gets the
password. Disadvantages of Key Stro ke
Dynamics include that password rejection rate
is high due to different levels of typing speed of
users.
IV.
Face Recognition
Speech recognition
Iris recognition etc.
PREVENTION TACTICS
Graphical passwords
Fig 5. biometrics
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 13
C.
Click patterns
V.
CONCLUSION
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 14
VI.
REFERENCES
[1]
S M Taiabul Haque and Matthew
Wright A Study of User Password
Strategy for Multiple Accounts in International
Journal of Computer Applications (0975 8887)
Volume 68 No.3
[2]
Arvind Narayanan and Vitaly Shmatikov
Fast Dictionary Attacks on Passwords Using T
ime-Space Tradeoff in The University of Texas
at
Austin {arvindn,shmat}@cs.utexas.edu
[3]
Mudassar Raza, Muhammad Iqbal,
Muhammad Sharif and Waqas Haider A
Survey of Password Attacks and Comparative
Analysis on
[7]
ARASH HABIBI LASHKARI Shoulder
Surfing attack in graphical password
authentication in (IJCSIS) International Journal
of Computer Science and Information Security,
Vol. 6, No. 2, 2009
[8]
Ahmad Alamgir Khan Preventing
Phishing Attacks using One T ime
Password and User Machine Identification in
International Journal of Computer Applications
(0975 8887) Volume 68 No.3, April 2013
[9]
D. Florencio and C. Herley. A largescale study of web password habits. In
Proceedings of the 16th international
conference on World Wide Web, pages 657
666, May 2007.
[10]
Haider, S., A. Abbas and A.K. Zaidi,
2000. A Mult i Technique Approach for User
Identification through Keystroke Dynamics,
2000 IEEE International Conference on Systems,
Man and Cybernetics
Edward Graves
password
cracking
High
by
All copy rights Reserved by NATCOMM - 2014, Christ Knowledge City , Mannoor, India.
Published by IJRCCT (www.ijrcct.org)
Page 15