Open Access Open Access  Restricted Access Subscription Access

A Study of Password Stealing Attacks and their Protection Mechanism

Khursaid Ansari, Prajwal Chaudhary

Abstract


In today’s world, taking secret word hash records and cracking the hash passwords has become extremely simple for a foe. Because of this, each individual's record is under a thorough danger of being hacked which is occurring in a quick rate. As network safety dangers are booming expanding, there is a need to make new systems for safeguarding our certifications. While passwords are a fragile kind of safety, their straightforwardness simplifies them to use and control. Passwords can provide satisfactory security if customers are convinced of their value, appropriate training is provided, and consideration is given. Similarly, passwords are a type of security based on "what you know"; they are ineffective against assault when used on their own, but when combined with "what you have" or "what you are" frameworks, they are extremely effective. We tried to provide the information on the process of choosing and maintaining passwords as well as their mechanisms for cracking time. Additionally, we discussed various password-stealing techniques and network correspondence security measures. The security of passwords is a basic activity in an electronic system (in a disengaged structure too). It avoids feeble activities and mystery loss of the singular client.

Full Text:

PDF

References


K. S. M. Moe and T. Win, "Improved hashing and honey-based stronger password prevention against brute force attack," in 2017 International Symposium on Electronics and Smart Devices (ISESD), 2017.

"Microsoft," 2006. [Online]. Available: at: http://www.microsoft.com/protect/yourself/password/create.mspx. [Accessed 26 October 2022].

T. Fandakly and C. Caporusso, "Strong passwords: How to create and use them," International Conference on Applied Human Factors and Ergonomics, pp. 48-58, 2019.

S. Furnell, "An assessment of website password practices," Computers & Security, vol. 26, pp. 445-451, 2007.

"Password cracking," [Online]. Available: https://en.wikipedia.org/wiki/Password_cracking. [Accessed 26 October 2022].

W. R. Cheswick, Firewalls And Internet Security: Repelling The Wily Hacker, 2/E, Pearson Education, 2003.

K. Brown, "The dangers of weak hashes," SANS Institute InfoSec Reading Room, Maryland US, pp. 1-22, 2013.

S. Bruce, Applied Cryptography: Protocols, Algorthms, and Source Code in C.-2nd, Schneier, 1996.

A.J. Menezes, P. C. Van Oorschot and S. A. Vanstone, Handbook of applied cryptography, CRC press, 2018.

A. Haldorai and A. Ramu, "Security and channel noise management in cognitive radio networks," Computers & Electrical Engineering, vol. 87, p. 106784.


Refbacks

  • There are currently no refbacks.