2012
DOI: 10.1109/tdsc.2011.24
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

Abstract: Abstract-Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this paper we discuss the inadequacy of existing and proposed login protocols designed to address largescale o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(35 citation statements)
references
References 17 publications
(36 reference statements)
0
34
0
Order By: Relevance
“…User devices may be whitelisted by IP addresses, cookies, geolocation services as enabled in popular browsers including Google Chrome 1 and Mozilla Firefox, 2 or through other web-based device fingerprinting mechanisms (see e.g., [34]). Assuming that most legitimate users access their accounts from a relatively fixed set of devices (computers at home or office, or mobile devices), such exemptions from fake sessions may aid usability; similar mechanisms have been explored in prior work (see e.g., [38,1]; more in Section 6). However, to counter guessing attacks from infected whitelisted devices and cookie theft, such exemptions must be limited (e.g., by the number of allowed attempts without fake sessions).…”
Section: Additional Login Help For Legitimate Usersmentioning
confidence: 99%
See 2 more Smart Citations
“…User devices may be whitelisted by IP addresses, cookies, geolocation services as enabled in popular browsers including Google Chrome 1 and Mozilla Firefox, 2 or through other web-based device fingerprinting mechanisms (see e.g., [34]). Assuming that most legitimate users access their accounts from a relatively fixed set of devices (computers at home or office, or mobile devices), such exemptions from fake sessions may aid usability; similar mechanisms have been explored in prior work (see e.g., [38,1]; more in Section 6). However, to counter guessing attacks from infected whitelisted devices and cookie theft, such exemptions must be limited (e.g., by the number of allowed attempts without fake sessions).…”
Section: Additional Login Help For Legitimate Usersmentioning
confidence: 99%
“…For example, the password guessing resistant protocol (PGRP [1]), where more RTTs are imposed on unknown (possibly attack) machines than known (possibly legitimate) ones; machines are categorized using source IP addresses and cookies. As discussed in Section 3.1.2, item (e), the use of known devices may reduce the number of fake sessions for legitimate users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[1][2]The two most common online password guessing attacks are Brute Force attacks and Dictionary attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Straightforwardly, a typing username and password authentication mechanism can be added on the platform. But this is not reasonable that attacker can easily use brute-force way, or dictionary attack [2] way to guess the password. In addition, biometrics [3], e.g., face [4], voice [5], palmprint [6], finger vein [7], or iris [8] authentication seems to be a good way to protect user privacy information.…”
Section: Introductionmentioning
confidence: 99%