2020
DOI: 10.32628/ijsrset207139
|View full text |Cite
|
Sign up to set email alerts
|

Technique to Thwart Brute-Force Attack : A Survey

Abstract: Most encryption techniques have one essential problem that is they are vulnerable to brute-force attacks. Techniques used to prevent brute force attacks are increasing password length, password complexity, limit login attempts, using captcha, two factor authentication etc. A new mechanism to prevent against brute-force attack was introduced and this mechanism is known as Deception Model. Deception-based security mechanisms focus on altering adversaries perception in a way that can confuse them and waste their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
2

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
1
0
2
Order By: Relevance
“…Kerangka kerja penelitian tiap tahapnya memiliki keterkaitan dengan tahap berikutnya [14]. Penelitian dimulai dengan mengidentifikasi masalah pada webserver aplikasi, melakukan observasi langsung webserver aplikasi, melakukan studi literatur mengenai penetrasi testing, menerapkan metode yang digunakan, melakukan hasil dan pembahasan serta membuat kesimpulan dan saran [15].…”
Section: Kerangka Kerja Penelitianunclassified
“…Kerangka kerja penelitian tiap tahapnya memiliki keterkaitan dengan tahap berikutnya [14]. Penelitian dimulai dengan mengidentifikasi masalah pada webserver aplikasi, melakukan observasi langsung webserver aplikasi, melakukan studi literatur mengenai penetrasi testing, menerapkan metode yang digunakan, melakukan hasil dan pembahasan serta membuat kesimpulan dan saran [15].…”
Section: Kerangka Kerja Penelitianunclassified
“…In Recent Times, a massive number of malwares has been devised for attacking IoT systems [75,76] Control flow side-channel assessment [77], software integrity validation, malware detector [78], Security updates [79] (continued) Reverse Engineering All An attempt to analyze the firmware of IoT devices to reach sensitive data i.e., users' credentials [93] Self-destruction and Tamper proofing, IC/IP Obfuscation and encryption [94,95] (continued) Identity and access management, authentication, multi-factor authentication guidance, dynamic credentials [100] Brute-force attacks S4, S6 An active attack hinges on a trial-and-error strategy to obtain some data such as passwords, finance, identifiers. It employs automatic software to engender a massive amount of successive suppositions to decrypt the ciphertext [85,86] Locking out IP address, discovery tools, brute force site scanning tools [101] Data exposure attacks…”
Section: Allmentioning
confidence: 99%
“…Kerangka Kerja PenelitianKerangka kerja penelitian tiap tahapnya memiliki keterkaitan dengan tahap berikutnya[14]. Penelitian dimulai dengan mengidentifikasi masalah pada webserver aplikasi, melakukan observasi langsung webserver aplikasi, melakukan studi literatur mengenai penetrasi testing, menerapkan metode yang digunakan, melakukan hasil dan pembahasan serta membuat kesimpulan dan saran[15].Metode Penetration Testing Execution Standar dapat diterapkan pada webserver aplikasi pelaporan pajak daerah. Kategori keamanan aplikasi yang sebelumnya pada kategori Medium dengan 7 buah jenis kerentanan dapat diturunkan menjadi kategori Low dengan hanya 1 buah jenis kerentanan, sehingga keamanan webserver aplikasi pelaporan pajak daerah dapat ditingkatkan.…”
unclassified