Shadow Attacks Based on Password Patterns Password Reuses
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017

Shadow Attacks Based on Password Patterns Password Reuses

Bhavika Garase, N. D. Kale

As the number of websites is increasing, the security level of password enabled accounts is no longer secured. It may possible that end users can create the many accounts on either same website or multiple websites, hence the passwords for all accounts from the same user likely to similar or same. This leads the users account can compromised by attackers and then identify the same user passwords in sensitive accounts like banking accounts. This type of attacks on password is basically known as shadow attacks on password. In this project, we are presenting the framework to study the state of art of Cross Site Password Reused (CSPR) and Intra Site Password Reuses (ISPR) based on large scale password datasets in order to improve the password reuse success rate. The novelty of the proposed approach is detailed empirical study on web password reuses of both cross site and intra site password reuses. The pre-processing step is redesigned in our proposed work in which noise removal is done in terms of invalid email addresses, spaces etc. rather removing the duplicate accounts. This will helps to improve the guessing success rate performance as compared to previous work

Keywords: Logo detection, Context-dependent kernel, recognition of Context-dependent kernel, CDS, SURF

Edition: Volume 6 Issue 11, November 2017

Pages: 1169 - 1173

Share this Article

How to Cite this Article?

Bhavika Garase, N. D. Kale, "Shadow Attacks Based on Password Patterns Password Reuses", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178038, Volume 6 Issue 11, November 2017, 1169 - 1173

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Logo detection'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 931 - 935

An Improved Approach for Logo Detection and Recognition from the Images Using SURF

Prajkata Musale, Deepak Gupta

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1169 - 1173

Shadow Attacks Based on Password Patterns Password Reuses

Bhavika Garase, N. D. Kale

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1233 - 1238

Logo Detection and Recognition from the Images As Well As Videos

Meera Sambhaji Sawalkar, Mrunalinee Patole

Share this Article

Similar Articles with Keyword 'Context-dependent kernel'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 931 - 935

An Improved Approach for Logo Detection and Recognition from the Images Using SURF

Prajkata Musale, Deepak Gupta

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1169 - 1173

Shadow Attacks Based on Password Patterns Password Reuses

Bhavika Garase, N. D. Kale

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1233 - 1238

Logo Detection and Recognition from the Images As Well As Videos

Meera Sambhaji Sawalkar, Mrunalinee Patole

Share this Article

Similar Articles with Keyword 'CDS'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 931 - 935

An Improved Approach for Logo Detection and Recognition from the Images Using SURF

Prajkata Musale, Deepak Gupta

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2301 - 2305

Tweaking the CSMA/CD Protocal using a System Buffer

Nishant Kumar Singh

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1169 - 1173

Shadow Attacks Based on Password Patterns Password Reuses

Bhavika Garase, N. D. Kale

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1233 - 1238

Logo Detection and Recognition from the Images As Well As Videos

Meera Sambhaji Sawalkar, Mrunalinee Patole

Share this Article

Similar Articles with Keyword 'SURF'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1974 - 1979

Implementation of Enhanced Feedback in Automated Latent Fingerprint Matcher

Lekshmi S P, Lizmol Stephen

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1141 - 1146

Offline Hindi Signature Recognition Using Surf Feature Extraction and Neural Networks Approach

Harpreet Kaur, Simarjeet Kaur

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 931 - 935

An Improved Approach for Logo Detection and Recognition from the Images Using SURF

Prajkata Musale, Deepak Gupta

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article



Top