A Framework for experience based user authentication technique for minimizing risk of brute-force attacks

Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamad A.I., Mohamed M.A., Makhtar M., Mamat M., Jamil N., Din M.M.
Other Authors: 57220523359
Format: Article
Published: Blue Eyes Intelligence Engineering and Sciences Publication 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-24794
record_format dspace
spelling my.uniten.dspace-247942023-05-29T15:27:10Z A Framework for experience based user authentication technique for minimizing risk of brute-force attacks Mohamad A.I. Mohamed M.A. Makhtar M. Mamat M. Jamil N. Din M.M. 57220523359 57194596063 36706254900 35761412000 36682671900 55348871200 Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system. In addition, brute force attack has been used against the authentication system by using special software readily available. To address this issue, we proposed an experience-based authentication system, which makes use of user experience as a password during the verification process. In this study, we choose a list of mountains climbed by a user in combination with the year of visit as a password. The system consists of two parts, sign up and sign in. User registration is done during the sign up, whereas user authentication is carried out during the sign in process. Given the number of mountains around the world that is nearly a million in total, and by allowing user to have any combination of mountain, the risk of brute force attack can be minimize significantly. The ability of this system that can withstand such an attack from the outside could increase the current standard security level. � BEIESP. Final 2023-05-29T07:27:10Z 2023-05-29T07:27:10Z 2019 Article 2-s2.0-85070270494 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85070270494&partnerID=40&md5=cd4f23678358eda23924afa22f5ec099 https://irepository.uniten.edu.my/handle/123456789/24794 7 5 660 664 Blue Eyes Intelligence Engineering and Sciences Publication Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Authentication is the process of verifying somebody or something about who he claim he is. The current methods have some drawbacks, which is high cost for special tools, high maintenances, low reliability, lost or broken by user�s poor handling and needs for special expertise in operating the system. In addition, brute force attack has been used against the authentication system by using special software readily available. To address this issue, we proposed an experience-based authentication system, which makes use of user experience as a password during the verification process. In this study, we choose a list of mountains climbed by a user in combination with the year of visit as a password. The system consists of two parts, sign up and sign in. User registration is done during the sign up, whereas user authentication is carried out during the sign in process. Given the number of mountains around the world that is nearly a million in total, and by allowing user to have any combination of mountain, the risk of brute force attack can be minimize significantly. The ability of this system that can withstand such an attack from the outside could increase the current standard security level. � BEIESP.
author2 57220523359
author_facet 57220523359
Mohamad A.I.
Mohamed M.A.
Makhtar M.
Mamat M.
Jamil N.
Din M.M.
format Article
author Mohamad A.I.
Mohamed M.A.
Makhtar M.
Mamat M.
Jamil N.
Din M.M.
spellingShingle Mohamad A.I.
Mohamed M.A.
Makhtar M.
Mamat M.
Jamil N.
Din M.M.
A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
author_sort Mohamad A.I.
title A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
title_short A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
title_full A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
title_fullStr A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
title_full_unstemmed A Framework for experience based user authentication technique for minimizing risk of brute-force attacks
title_sort framework for experience based user authentication technique for minimizing risk of brute-force attacks
publisher Blue Eyes Intelligence Engineering and Sciences Publication
publishDate 2023
_version_ 1806427291708817408
score 13.214268