The knowledge based authentication attacks
Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for steal...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book Section |
Published: |
CSREA Press
2011
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/29747/ http://world-comp.org/p2011/SAM8123.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.29747 |
---|---|
record_format |
eprints |
spelling |
my.utm.297472017-07-31T04:12:11Z http://eprints.utm.my/id/eprint/29747/ The knowledge based authentication attacks Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari T Technology (General) Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work. CSREA Press 2011 Book Section PeerReviewed Farnaz, Towhidi and Abdul Manaf, Azizah and Mohd. Daud, Salwani and Arash, Habibi Lashkari (2011) The knowledge based authentication attacks. In: Proceedings Of The 2011 International Conference On Security & Management. CSREA Press, USA, pp. 1-5. ISBN 1-60132-196-1 http://world-comp.org/p2011/SAM8123.pdf |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari The knowledge based authentication attacks |
description |
Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work. |
format |
Book Section |
author |
Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari |
author_facet |
Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari |
author_sort |
Farnaz, Towhidi |
title |
The knowledge based authentication attacks |
title_short |
The knowledge based authentication attacks |
title_full |
The knowledge based authentication attacks |
title_fullStr |
The knowledge based authentication attacks |
title_full_unstemmed |
The knowledge based authentication attacks |
title_sort |
knowledge based authentication attacks |
publisher |
CSREA Press |
publishDate |
2011 |
url |
http://eprints.utm.my/id/eprint/29747/ http://world-comp.org/p2011/SAM8123.pdf |
_version_ |
1643648366384513024 |