International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 19 | Number 2 | Year 2015 | Article Id. IJETT-V19P239 | DOI : https://doi.org/10.14445/22315381/IJETT-V19P239

A Survey on Password Stealing Attacks and Its Protecting Mechanism


Venkadesh .S , K.Palanivel

Citation :

Venkadesh .S , K.Palanivel, "A Survey on Password Stealing Attacks and Its Protecting Mechanism," International Journal of Engineering Trends and Technology (IJETT), vol. 19, no. 2, pp. 223-226, 2015. Crossref, https://doi.org/10.14445/22315381/IJETT-V19P239

Abstract

People enjoy the convenience of on-line services, however on-line environments might bring several risks. In the on-line communication, the password has a crucial role to secure user personal details. These passwords are taken to be secure and it should be retain in person. The third person might take a password without knowledge of original user and they might do any dishonest activities on the victim’s account. The passwords are taken by using anyone of the attack mechanism like Phishing attack, password Stealing Program Attack and etc… The user may use personal details in on-line setting. These personal details should be secured. There are many types of mechanisms available to secure the password and user’s information. This paper makes a survey concerning such forms of protection mechanisms and brings awareness to the people

Keywords

Phishing Attack, Password Stealing Program Attack, Shoulder-Surfing Attack, Password Management Practices

References

[1] [Online].Available:http://en.wikipedia.org/wiki/Phishing
[2] Anti-Phishing Working Group. [Online]. Available:http://www.antiphishing.org
[3] [Online].Available: http://en.wikipedia.org/wiki/Key${-}$logger
[4] S. Furnell, “An assessment of website password practices,” Computers & Security, 26(7-8), December 2007, pp. 445-451.
[5] Microsoft whitepaper, “Strong passwords: How to create and use them,” 2006, Accessed Jan. 31, 2008,Available at: http://www.microsoft.com/protect/yourself/password/create.mspx.
[6] Abdalla.M, Bresson.E, Chevassut.O, Moller.B and Pointcheval.D,“Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol”, Int.J.Security Netw., vol. 2, nos.3-4,pp. 284-296, 2007.
[7] Fathy. A, ElBatt.T and Youssef.M “A Source Authentication Scheme Using Network coding”, Int.J.Security Netw., vol. 6, nos.2-3, pp.123-135, 2011.
[8] Herley.C and Florencio.D, “How to login from an internet café without worrying about keyloggers”, in proc. SOUPS, 2006.
[9] One-Time Password [Online]. Available:http://en.wikipedia.org/wiki/One-time?password.
[10] Perrig.A, Szewczyk.R, Tygar.J.D, Wen.V and Culler D.E,”SPINS: Security Protocols for Sensor Networks”,Wirel.Netw., vol. 6, no. 5, pp. 521-534, 2002.
[11] Widenbeck.S, Waters.J, Sobrado.L, and Birget.J, ”Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme”, in Proc. Working Conf.Adv. Vis.Interfaces.
[12] Yang Xiao, Chung-Chih Li, Ming Lei, and Susan V. Vrbsky, ” Differentiated Virtual Passwords, Secret LittleFunctions, and Codebooks for Protecting Users From Password Theft” Systems Journal, IEEE

Time: 0.0015 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB