Reliable, Usable Signaling to Defeat Masquerade Attacks
نویسنده
چکیده
In the nineties the disconnection between physical experience and the digital networked experience was celebrated individuals were said to move into cyberspace, become virtual and leave the constraints of the physical realm. Despite the very real existence of tracking and surveillance software, it remains the case that identity assertions online remain problematic at best. While there are many benefits to this relative anonymity online, it also creates a serious problem of distinguishing between valid merchants and criminal enterprises, between reliable web sites and sites that install malware. The paucity of information exacerbates poor understanding of the risks involved in particular transactions, exposing users to losses and driving out parties who would otherwise engage in productive behavior.
منابع مشابه
User Authentication with Provable Security against Online Dictionary Attacks
Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT), some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decisio...
متن کاملMasquerade attacks based on user's profile
There are several problems related to security in computer networks. In this work only detection of masquerade attacks is explored. A masquerade attack occurs when an illegitimate user tries to impersonate a legitimate user; therefore, the masquerade user gets the privileges from the legitime user account. The task of detecting masquerade users is not easy since the masquerade user has yield th...
متن کاملCombining Baiting and User Search Profiling Techniques for Masquerade Detection
Masquerade attacks are characterized by an adversary stealing a legitimate user’s credentials and using them to impersonate the victim and perform malicious activities, such as stealing information. Prior work on masquerade attack detection has focused on profiling legitimate user behavior and detecting abnormal behavior indicative of a masquerade attack. Like any anomaly-detection based techni...
متن کاملDecoy Document Deployment for Effective Masquerade Attack Detection
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on profiling legitimate user behavior and detecting deviations from that normal behavior that could potentially signal an ongoing masquerade attack. Such approaches suffer from high false positive rates. Other work investigated the use of trap-bas...
متن کاملSequence alignment for masquerade detection
The masquerade attack, where an attacker takes on the identity of a legitimate user to maliciously utilize that user’s privileges, poses a serious threat to the security of information systems. Such attacks completely undermine traditional security mechanisms, including strong authentication and intrusion detection, because the trust imparted in user accounts once they have been authenticated. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006