首页> 外文期刊>International Journal of Information Security >Design and implementation of Negative Authentication System
【24h】

Design and implementation of Negative Authentication System

机译:否定验证系统的设计与实现

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS.
机译:现代社会主要依赖于官方或社会通信,基金转移等的在线活动。未经授权的系统访问是网络系统中最重要的问题之一。对于任何网络系统,强大的身份验证是确保安全性和可靠访问所有类型事务的绝对必要性。然而,超过80%的当前认证系统是基于密码的,并且令人惊讶的是,它们通过猜测或侧频攻击倾向于直接和间接开裂。负认证系统(NAS)的灵感基于负选择算法。在NAS中,有效用户的基于密码的身份验证数据被称为密码配置文件或自我区域(正配置文件);除自我区域之外的任何元素被定义为同一代表性空间中的非自我区域。产生防密码探测器,其涵盖了大多数非自我区域。在非自我区域中还有一些未覆盖的区域,以引起攻击者的不确定性。在这项工作中,我们描述了三种NAS方法的设计和实现及其对其他认证方法的功效。这三种方法代表了三种不同的方法,实现了使用非密码空间的密码点的混淆。实验是用真实的和模拟密码配置文件进行的,以证明NAS的不同实现的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号