2019
DOI: 10.1109/tifs.2019.2895955
|View full text |Cite
|
Sign up to set email alerts
|

Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

Abstract: In September 2017, McAffee Labs quarterly report [2] estimated that brute force attacks represent 20% of total network attacks, making them the most prevalent type of attack ex-aequo with browser based vulnerabilities. These attacks have sometimes catastrophic consequences, and understanding their fundamental limits may play an important role in the risk assessment of password-secured systems, and in the design of better security protocols. While some solutions exist to prevent online brute-force attacks that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(39 citation statements)
references
References 35 publications
(69 reference statements)
0
39
0
Order By: Relevance
“…x V (x)W (y|x). As is well known from previous work (see, e.g., [5], [6]), randomized guessing according to an i.i.d. distribution Q yields a guessing exponent of ln( y P (y)/[Q(y)] ρ ).…”
Section: The Assumption Wmentioning
confidence: 99%
“…x V (x)W (y|x). As is well known from previous work (see, e.g., [5], [6]), randomized guessing according to an i.i.d. distribution Q yields a guessing exponent of ln( y P (y)/[Q(y)] ρ ).…”
Section: The Assumption Wmentioning
confidence: 99%
“…• A brute force attack aims to produce a list of all possible passwords that can be used by IoT devices at agriculture sensors layer, then to exhaust them one by one until the correct password can be identified [65].…”
Section: Attacks Against Confidentialitymentioning
confidence: 99%
“…Given a distribution of X , a commonly used performance metric for this problem is the expected number of guesses or, more generally, the moment of the number of guesses until X is guessed successfully. When it comes to guessing random vectors, say, of length n , minimizing the moments of the number of guesses by different (deterministic or randomized) guessing strategies has several applications and motivations in information theory, such as sequential decoding, guessing passwords, etc., and it is also strongly related to lossless source coding (see, e.g., [ 9 , 10 , 11 , 12 , 13 , 19 , 20 , 21 , 22 , 32 , 33 , 34 ]). In this vector case, the moments of the number of guesses behave as exponential functions of the vector dimension, n , at least asymptotically, as n grows without bound.…”
Section: Applicationsmentioning
confidence: 99%
“…Consider a random guessing strategy where the guesser sequentially submits a sequence of independently drawn random guesses according to a certain probability distribution, , defined on . Randomized guessing strategies have the advantage that they can be used by multiple asynchronous agents, which submit their guesses concurrently (see [ 33 , 34 ]).…”
Section: Applicationsmentioning
confidence: 99%