The knowledge based authentication attacks

Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for steal...

Full description

Saved in:
Bibliographic Details
Main Authors: Farnaz, Towhidi, Abdul Manaf, Azizah, Mohd. Daud, Salwani, Arash, Habibi Lashkari
Format: Book Section
Published: CSREA Press 2011
Subjects:
Online Access:http://eprints.utm.my/id/eprint/29747/
http://world-comp.org/p2011/SAM8123.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.29747
record_format eprints
spelling my.utm.297472017-07-31T04:12:11Z http://eprints.utm.my/id/eprint/29747/ The knowledge based authentication attacks Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari T Technology (General) Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work. CSREA Press 2011 Book Section PeerReviewed Farnaz, Towhidi and Abdul Manaf, Azizah and Mohd. Daud, Salwani and Arash, Habibi Lashkari (2011) The knowledge based authentication attacks. In: Proceedings Of The 2011 International Conference On Security & Management. CSREA Press, USA, pp. 1-5. ISBN 1-60132-196-1 http://world-comp.org/p2011/SAM8123.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic T Technology (General)
spellingShingle T Technology (General)
Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
The knowledge based authentication attacks
description Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work.
format Book Section
author Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
author_facet Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
author_sort Farnaz, Towhidi
title The knowledge based authentication attacks
title_short The knowledge based authentication attacks
title_full The knowledge based authentication attacks
title_fullStr The knowledge based authentication attacks
title_full_unstemmed The knowledge based authentication attacks
title_sort knowledge based authentication attacks
publisher CSREA Press
publishDate 2011
url http://eprints.utm.my/id/eprint/29747/
http://world-comp.org/p2011/SAM8123.pdf
_version_ 1643648366384513024