Resilience of students' passwords against attacks

被引:0
|
作者
Brumen, Bostjan [1 ]
Makari, Tadej [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Smetanova 17, SI-2000 Maribor, Slovenia
关键词
SECURITY; USERS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry,.). In this paper we present an analysis of passwords used by students of one of universities and their resilience against brute force and dictionary attacks. The passwords were obtained from a university's computing center in plaintext format for a very long period - first passwords were created before 1980. The results show that early passwords are extremely easy to crack: the percentage of cracked passwords is above 95 % for those created before 2006. Surprisingly, more than 40 % of passwords created in 2014 were easily broken within a few hours. The results show that users - in our case students, despite positive trends, still choose easy to break passwords. This work contributes to loud warnings that a shift from traditional password schemes to more elaborate systems is needed.
引用
收藏
页码:1275 / 1279
页数:5
相关论文
共 50 条
  • [1] Client-CASH: Protecting Master Passwords against Offline Attacks
    Blocki, Jeremiah
    Sridhar, Anirudh
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 165 - 176
  • [2] Picture Passwords Superiority and Picture Passwords Dictionary Attacks
    Golofit, Krzysztof
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 179 - 183
  • [3] Resilience of GANs against Adversarial Attacks
    Rudayskyy, Kyrylo
    Miri, Ali
    [J]. SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 390 - 397
  • [4] AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords
    Shen, Jaryn
    Yuen, Timothy T.
    Choo, Kim-Kwang Raymond
    Zeng, Qingkai
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 514 - 532
  • [5] Maximizing Network Resilience against Malicious Attacks
    Li, Wenguo
    Li, Yong
    Tan, Yi
    Cao, Yijia
    Chen, Chun
    Cai, Ye
    Lee, Kwang Y.
    Pecht, Michael
    [J]. SCIENTIFIC REPORTS, 2019, 9 (1)
  • [6] Resilience of public transport networks against attacks
    B. Berche
    C. von Ferber
    T. Holovatch
    Yu. Holovatch
    [J]. The European Physical Journal B, 2009, 71 : 125 - 137
  • [7] Maximizing Network Resilience against Malicious Attacks
    Wenguo Li
    Yong Li
    Yi Tan
    Yijia Cao
    Chun Chen
    Ye Cai
    Kwang Y. Lee
    Michael Pecht
    [J]. Scientific Reports, 9
  • [8] Resilience of public transport networks against attacks
    Berche, B.
    von Ferber, C.
    Holovatch, T.
    Holovatch, Yu.
    [J]. EUROPEAN PHYSICAL JOURNAL B, 2009, 71 (01): : 125 - 137
  • [9] Analysing Real Students' Passwords and Students' Passwords Characteristics Received From a Questionnaire
    Taneski, Viktor
    Hericko, Marian
    Brumen, Bostjan
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1436 - 1441
  • [10] Analysis of phishing attacks against students
    Andric, Jakov
    Oreski, Dijana
    Kisasondi, Tonimir
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1423 - 1429