A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Blue Eyes Intelligence Engineering and Sciences Publication
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-24794 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-247942023-05-29T15:27:10Z A Framework for experience based user authentication technique for minimizing risk of brute-force attacks Mohamad A.I. Mohamed M.A. Makhtar M. Mamat M. Jamil N. Din M.M. 57220523359 57194596063 36706254900 35761412000 36682671900 55348871200 Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system. In addition, brute force attack has been used against the authentication system by using special software readily available. To address this issue, we proposed an experience-based authentication system, which makes use of user experience as a password during the verification process. In this study, we choose a list of mountains climbed by a user in combination with the year of visit as a password. The system consists of two parts, sign up and sign in. User registration is done during the sign up, whereas user authentication is carried out during the sign in process. Given the number of mountains around the world that is nearly a million in total, and by allowing user to have any combination of mountain, the risk of brute force attack can be minimize significantly. The ability of this system that can withstand such an attack from the outside could increase the current standard security level. � BEIESP. Final 2023-05-29T07:27:10Z 2023-05-29T07:27:10Z 2019 Article 2-s2.0-85070270494 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85070270494&partnerID=40&md5=cd4f23678358eda23924afa22f5ec099 https://irepository.uniten.edu.my/handle/123456789/24794 7 5 660 664 Blue Eyes Intelligence Engineering and Sciences Publication Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system. In addition, brute force attack has been used against the authentication system by using special software readily available. To address this issue, we proposed an experience-based authentication system, which makes use of user experience as a password during the verification process. In this study, we choose a list of mountains climbed by a user in combination with the year of visit as a password. The system consists of two parts, sign up and sign in. User registration is done during the sign up, whereas user authentication is carried out during the sign in process. Given the number of mountains around the world that is nearly a million in total, and by allowing user to have any combination of mountain, the risk of brute force attack can be minimize significantly. The ability of this system that can withstand such an attack from the outside could increase the current standard security level. � BEIESP. |
author2 |
57220523359 |
author_facet |
57220523359 Mohamad A.I. Mohamed M.A. Makhtar M. Mamat M. Jamil N. Din M.M. |
format |
Article |
author |
Mohamad A.I. Mohamed M.A. Makhtar M. Mamat M. Jamil N. Din M.M. |
spellingShingle |
Mohamad A.I. Mohamed M.A. Makhtar M. Mamat M. Jamil N. Din M.M. A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
author_sort |
Mohamad A.I. |
title |
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
title_short |
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
title_full |
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
title_fullStr |
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
title_full_unstemmed |
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks |
title_sort |
framework for experience based user authentication technique for minimizing risk of brute-force attacks |
publisher |
Blue Eyes Intelligence Engineering and Sciences Publication |
publishDate |
2023 |
_version_ |
1806427291708817408 |
score |
13.214268 |