Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017
Shadow Attacks Based On Password Patterns Password Reuses
Bhavika Garse | N. D. Kale 
Abstract: For secured websites, the password based authentication is frequently used approach for authenticating the end user before granting the access. The growing use of password based authentication approach at increasing websites leads to the important issue of possibility of password reuses among accounts of various websites or similar websites. Additionally, the recent study on numerous high profile password hacking claims that password situation is not better. Under such cases, there is huge possibility of shadow attacks in which an attacker can successfully compromise the account that reuses the password of other accounts those are from similar website or different websites. The reuse of passwords for different accounts under same website is called as Intra-Site Password Reuses (ISPR). The reuse of passwords for different accounts under different websites is called as Cross-Site Password Reuses (CSPR). Therefore in order to prevent such shadow attacks on passwords, first we need to understand and examine the both ISPR and CSPR based on publically available password datasets. However, there is no in-depth empirical study conducted in literature except the one very recently introduced on Chinese password datasets However the problem with this method is that they are removing the duplicate profiles and passwords largely in their pre-processing step, this can reduces the scalability of password reuses.
Keywords: Pre-processing, Dataset, ISPR, CSPR
Edition: Volume 6 Issue 5, May 2017,
Pages: 2530 - 2533
How to Cite this Article?
Bhavika Garse, N. D. Kale, "Shadow Attacks Based On Password Patterns Password Reuses", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2530-2533, https://www.ijsr.net/get_abstract.php?paper_id=ART20173875
How to Share this Article?
Similar Articles with Keyword 'Preprocessing'
Privacy Preserving Closed Frequent Pattern Mining
Palm Print Recognition System - Review
Mohit Trehan | Nitin Bhagat