首页> 外文会议>2016 IEEE Ecuador Technical Chapters Meeting >How easy is to break password protection: A preliminary empirical study
【24h】

How easy is to break password protection: A preliminary empirical study

机译:破解密码保护有多容易:初步的经验研究

获取原文
获取原文并翻译 | 示例

摘要

Background: These days, users are given access to information system functionalities through several security mechanisms, passwords being the most common form of access. There are many policies and rules, some stricter than others, to create passwords; however, they still remain vulnerable to attacks. Goal: In order to find out: the vulnerabilities of different passwords complexity levels created for this study, types of passwords used in attacks, and types of attackers and their origins; we conducted an empirical study. Method: This research was conducted through a controlled experiment. The study was based on honeypots emulating a SSH server, which was exposed to attacks for approximately 30 days on the Internet. Results: A large number of attacks were recorded, which were not capable of breaching any passwords complexity level. Conclusion: Although some attacks were carried out by means of sophisticated tools, none password complexity level was breached. We believe that it could be due to the experiment's duration was too short, or that the attackers simply did not have enough motivation to persist in the attempt to breach the access password to a site possibly listed as unattractive.
机译:背景:如今,通过几种安全机制为用户提供了访问信息系统功能的权限,密码是最常见的访问形式。创建密码有许多策略和规则,其中一些比其他一些更严格。但是,它们仍然容易受到攻击。目标:为了找出:为该研究创建的不同密码复杂性级别的漏洞,攻击中使用的密码类型以及攻击者的类型及其起源;我们进行了一项实证研究。方法:本研究是通过对照实验进行的。该研究基于模拟SSH服务器的蜜罐,该蜜罐在Internet上遭受了大约30天的攻击。结果:记录了大量攻击,这些攻击无法破坏任何密码的复杂性级别。结论:尽管某些攻击是通过复杂的工具进行的,但没有违反密码复杂性级别。我们认为,这可能是由于实验持续时间太短,或者是因为攻击者没有足够的动机来坚持尝试破坏对可能未列出吸引力的站点的访问密码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号