The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern enterprises collect, process, and analyze security data from various system and network logs. Previous studies show that, handling large security datasets and detecting anomalies from those are key challenges faced by most of todays' enterprises. Unfortunately most security professionals are inexperienced at performing data analysis. In this paper, we study published works analyzing one publicly...
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry, …). In this paper we present an analysis of passwords used by students of one of universities...
With the developing digital era, the users are more vulnerable to various types of security threats such as Phishing(RAT), a serious security threat to the internet users in which the intruder sends an email which looks legitimate, where the RATs are usually downloaded invisibly with a user - requested program such as game or in this case an email attachment. RATs provide a backdoor for administrative...
Nowadays, password-based authentication is one of the most widely used methods to authenticate a user before granting accesses to secured websites. Password reuses within the same website and across multiple ones can enable shadow attacks. In this project, we study web password reuses by analysing a large number of sample data and combine dynamic authentication factor to achieve better efficiency...
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
Big data based user authentication is a new approach that leverages the power of Big Data analytics to develop a fertile field for the next generation user authentication. This new approach relies on “something you do”-based verification methods, where the users' dynamic behaviors are analyzed in order to generate real-time uniquely identifiable information about them. Once the unique user's identification...
Authentication is one of the essential mechanism of a typical security model. It identifies the user legitimacy accessing any service over the network. Authentication can usually be done by a simple single-factor authentication method such as a password. Unfortunately, it is inadequate to ensure security when accessing variant resources and services across the Internet. Therefore, for users to authenticate...
In our modern society, comfort became a standard. This comfort, especially in cars can only be achieved by equipping the car with more electronic devices. Some of the electronic devices must cooperate with each other and thus they require a communication channel, which can be wired or wireless. In these days, it would be hard to sell a new car operating with traditional keys. Almost all modern cars...
Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
The fragile watermarking technique presented in this paper is based on the pixel information. The authentication data is calculated from the pixels by using Local Binary Pattern concept. Spatial information of pixels is used for watermark calculation and it is having spatial relationship of pixels. The authentication information is calculated for the block of 3×3 using LBP operator and we have used...
Recently Lu et al. proposed a modified anonymous two-factor authenticated key exchange protocol to eliminate the security weaknesses of Xie et al.'s scheme. They hence claimed that their scheme is immune to possible well-known attacks. However, we found that Lu et al.'s protocol is still insecure against the outsider attack, user impersonation attack, and off-line password guessing attack. To overcome...
This paper proposes a continuous authentication scheme for use in remote monitored biomedical devices, such as the Implantable Cardioverter Defibrillator or for a Pacemaker. In the age of remote monitoring, all your heart data is readily available on the device and is accessible to the doctor over the internet. However, it is possible that in the logged-in state and with the computer left unattended,...
In human history, the dependency on secret phrases - passwords - known to only a selected few in a group has mostly ensured that only those are authorised to access certain resources or information. However, such passwords have also spelled disasters when compromised. Beyond passwords, multi-factor authentication requires the knowledge of or the possession of things other than a password to complete...
Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication...
Authentication is the first step to access a resource (service, website, data, etc.), so it is of vital importance in a system. The most widely used authentication mechanisms are one-factor authentication based on password and two-factor authentication methods which require a password and another factor (verification code, biometric feature, hardware token, software plug-in, etc.). However, in many...
Cyber-Physical Systems are integration of computer-based equipment used in industrial automation, embedded systems, control systems and etc. Computer-based equipment needs to be protected against unauthorized access and control. The widely accepted approach to computer security is based on security in depth, meaning that the computer system is viewed as a layered structure and security is introduced...
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication...
Access control is regarded as absolutely crucial in any environment, especially in home and work environments where sensitive resources are accessed. In this paper, we propose a non-contact, gesture-based authentication alternative to password authentication. The solution focuses on capturing specific graphical information, in the form of patterns drawn in the air, as a means of authentication. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.