International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017


Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse | N. D. Kale [7]


Abstract: For secured websites, the password based authentication is frequently used approach for authenticating the end user before granting the access. The growing use of password based authentication approach at increasing websites leads to the important issue of possibility of password reuses among accounts of various websites or similar websites. Additionally, the recent study on numerous high profile password hacking claims that password situation is not better. Under such cases, there is huge possibility of shadow attacks in which an attacker can successfully compromise the account that reuses the password of other accounts those are from similar website or different websites. The reuse of passwords for different accounts under same website is called as Intra-Site Password Reuses (ISPR). The reuse of passwords for different accounts under different websites is called as Cross-Site Password Reuses (CSPR). Therefore in order to prevent such shadow attacks on passwords, first we need to understand and examine the both ISPR and CSPR based on publically available password datasets. However, there is no in-depth empirical study conducted in literature except the one very recently introduced on Chinese password datasets However the problem with this method is that they are removing the duplicate profiles and passwords largely in their pre-processing step, this can reduces the scalability of password reuses.


Keywords: Pre-processing, Dataset, ISPR, CSPR


Edition: Volume 6 Issue 5, May 2017,


Pages: 2530 - 2533


How to Cite this Article?

Bhavika Garse, N. D. Kale, "Shadow Attacks Based On Password Patterns Password Reuses", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2530-2533, https://www.ijsr.net/get_abstract.php?paper_id=ART20173875

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Preprocessing'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2810 - 2813

Palm Print Recognition System - Review

Mohit Trehan | Nitin Bhagat [3]

Share this Article


Top