The knowledge based authentication attacks

Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for steal...

Full description

Bibliographic Details
Main Authors: Farnaz, Towhidi, Abdul Manaf, Azizah, Mohd. Daud, Salwani, Arash, Habibi Lashkari
Format: Book Section
Published: CSREA Press 2011
Subjects:
_version_ 1796856607710117888
author Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
author_facet Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
author_sort Farnaz, Towhidi
collection ePrints
description Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work.
first_indexed 2024-03-05T18:45:34Z
format Book Section
id utm.eprints-29747
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T18:45:34Z
publishDate 2011
publisher CSREA Press
record_format dspace
spelling utm.eprints-297472017-07-31T04:12:11Z http://eprints.utm.my/29747/ The knowledge based authentication attacks Farnaz, Towhidi Abdul Manaf, Azizah Mohd. Daud, Salwani Arash, Habibi Lashkari T Technology (General) Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work. CSREA Press 2011 Book Section PeerReviewed Farnaz, Towhidi and Abdul Manaf, Azizah and Mohd. Daud, Salwani and Arash, Habibi Lashkari (2011) The knowledge based authentication attacks. In: Proceedings Of The 2011 International Conference On Security & Management. CSREA Press, USA, pp. 1-5. ISBN 1-60132-196-1 http://world-comp.org/p2011/SAM8123.pdf
spellingShingle T Technology (General)
Farnaz, Towhidi
Abdul Manaf, Azizah
Mohd. Daud, Salwani
Arash, Habibi Lashkari
The knowledge based authentication attacks
title The knowledge based authentication attacks
title_full The knowledge based authentication attacks
title_fullStr The knowledge based authentication attacks
title_full_unstemmed The knowledge based authentication attacks
title_short The knowledge based authentication attacks
title_sort knowledge based authentication attacks
topic T Technology (General)
work_keys_str_mv AT farnaztowhidi theknowledgebasedauthenticationattacks
AT abdulmanafazizah theknowledgebasedauthenticationattacks
AT mohddaudsalwani theknowledgebasedauthenticationattacks
AT arashhabibilashkari theknowledgebasedauthenticationattacks
AT farnaztowhidi knowledgebasedauthenticationattacks
AT abdulmanafazizah knowledgebasedauthenticationattacks
AT mohddaudsalwani knowledgebasedauthenticationattacks
AT arashhabibilashkari knowledgebasedauthenticationattacks