Downloads: 116 | Views: 284
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017 | Popularity: 6.4 / 10
Shadow Attacks Based on Password Patterns Password Reuses
Bhavika Garase, N. D. Kale
Abstract: As the number of websites is increasing, the security level of password enabled accounts is no longer secured. It may possible that end users can create the many accounts on either same website or multiple websites, hence the passwords for all accounts from the same user likely to similar or same. This leads the users account can compromised by attackers and then identify the same user passwords in sensitive accounts like banking accounts. This type of attacks on password is basically known as shadow attacks on password. In this project, we are presenting the framework to study the state of art of Cross Site Password Reused (CSPR) and Intra Site Password Reuses (ISPR) based on large scale password datasets in order to improve the password reuse success rate. The novelty of the proposed approach is detailed empirical study on web password reuses of both cross site and intra site password reuses. The pre-processing step is redesigned in our proposed work in which noise removal is done in terms of invalid email addresses, spaces etc. rather removing the duplicate accounts. This will helps to improve the guessing success rate performance as compared to previous work
Keywords: Logo detection, Context-dependent kernel, recognition of Context-dependent kernel, CDS, SURF
Edition: Volume 6 Issue 11, November 2017
Pages: 1169 - 1173
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 931 - 935An Improved Approach for Logo Detection and Recognition from the Images Using SURF
Prajkata Musale, Deepak Gupta
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2334 - 2337Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M
Downloads: 112
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2301 - 2305Tweaking the CSMA/CD Protocal using a System Buffer
Nishant Kumar Singh
Downloads: 125
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1233 - 1238Logo Detection and Recognition from the Images As Well As Videos
Meera Sambhaji Sawalkar, Mrunalinee Patole
Downloads: 127
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 288 - 292A Secure Mechanism for Content Distribution in Vehicular Ad-hoc Networks
Neeraja R, M. Jebakumari