Open Access   Article Go Back

Blacklisted Password Authentication System

Payal 1 , Suman Sangwan2 , Arun Malik3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 633-635, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.633635

Online published on Jun 30, 2019

Copyright © Payal, Suman Sangwan, Arun Malik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Payal, Suman Sangwan, Arun Malik, “Blacklisted Password Authentication System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.633-635, 2019.

MLA Style Citation: Payal, Suman Sangwan, Arun Malik "Blacklisted Password Authentication System." International Journal of Computer Sciences and Engineering 7.6 (2019): 633-635.

APA Style Citation: Payal, Suman Sangwan, Arun Malik, (2019). Blacklisted Password Authentication System. International Journal of Computer Sciences and Engineering, 7(6), 633-635.

BibTex Style Citation:
@article{Sangwan_2019,
author = {Payal, Suman Sangwan, Arun Malik},
title = {Blacklisted Password Authentication System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {633-635},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4605},
doi = {https://doi.org/10.26438/ijcse/v7i6.633635}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.633635}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4605
TI - Blacklisted Password Authentication System
T2 - International Journal of Computer Sciences and Engineering
AU - Payal, Suman Sangwan, Arun Malik
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 633-635
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
296 151 downloads 112 downloads
  
  
           

Abstract

Passwords have always been one of the simplest security methods, weak passwords, default passwords can easily be cracked using brute force attack and dictionary attack which is very dangerous for security of systems across the globe. Security and privacy issues are the challenges faced in many systems. Blacklisted Password Authentication System is an attempt to decrease the efficiency of Dictionary, Brute force Attack which can be implemented in any authentication system without any significant changes.

Key-Words / Index Term

Brute force Attack, Dictionary Attack, Authentication, Blacklisted Password

References

[1] Yan Zhao, Shiming Li, et al. “Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.” Hindawi Security and Communication Networks , 2018.
[2] Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer Society IEEE. pp. 80-84, 2017.
[3] Antonakakis, Manos, et al. "Understanding the mirai botnet." 26th USENIX Security Symposium. pp. 1093-1110, 2017.
[4] Ari Juels, et al. “Honeywords: Making Password-Cracking Detectable”, ACM, pp. 145-156, 2013.
[5] Vasundhara R.Pagar, Rohini G.Pise, “Strengthening Password Security through Honeyword and HoneyEncryption Technique”, IEEE, pp. 827-831, 2017.
[6] Sohaib Khan, Fawad Khan, “Attempt based Password”, in Proceedings of 13th International Bhurban Conference on Applied Science and Technology. IEEE, pp. 300-304, 2016.
[7] C.E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, pp. 379-423, 1948.
[8] Taha, Mariam M., et al. "On password strength measurements: Password entropy and password quality." In ICCEEE, IEEE, 2013.
[9] Wantong Zheng, et al. “CombinedPWD: A New Password Authentication Mechanism using Separators between Keystrokes”, 13th ICCIS Conference IEEE, pp. 557-560, 2017.
[10] Aakansha Gokhale,et al., “A Study of Various Passwords Authentication Techniques” International Journal of Computer Applications(0975–8887) International Conference on Advances in Science and Technology (ICAST), 2014
[11] Pa, Yin Minn Pa, et al. "Iotpot: A novel honeypot for revealing current iot threats." Journal of Information Processing 24.3, pp. 522-533,2016.
[12] John the Ripper password cracker, http://www.openwall.com/john/