International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017


Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse | N. D. Kale [7]


Abstract: For secured websites, the password based authentication is frequently used approach for authenticating the end user before granting the access. The growing use of password based authentication approach at increasing websites leads to the important issue of possibility of password reuses among accounts of various websites or similar websites. Additionally, the recent study on numerous high profile password hacking claims that password situation is not better. Under such cases, there is huge possibility of shadow attacks in which an attacker can successfully compromise the account that reuses the password of other accounts those are from similar website or different websites. The reuse of passwords for different accounts under same website is called as Intra-Site Password Reuses (ISPR). The reuse of passwords for different accounts under different websites is called as Cross-Site Password Reuses (CSPR). Therefore in order to prevent such shadow attacks on passwords, first we need to understand and examine the both ISPR and CSPR based on publically available password datasets. However, there is no in-depth empirical study conducted in literature except the one very recently introduced on Chinese password datasets However the problem with this method is that they are removing the duplicate profiles and passwords largely in their pre-processing step, this can reduces the scalability of password reuses.


Keywords: Pre-processing, Dataset, ISPR, CSPR


Edition: Volume 6 Issue 5, May 2017,


Pages: 2530 - 2533


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Bhavika Garse, N. D. Kale, "Shadow Attacks Based On Password Patterns Password Reuses", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2530-2533, https://www.ijsr.net/get_abstract.php?paper_id=ART20173875

Similar Articles with Keyword 'Preprocessing'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 509 - 514

Enhancing Lung Cancer Detection with Deep Learning: A CT Image Classification Approach

Jeevika K S | Dr. Savitha S K

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 10, October 2022

Pages: 660 - 667

Prediction of Student Admission using Fuzzy based Education Data Mining

Dr. Nikhat Khan

Share this Article
Top