Open Access   Article Go Back

False Positive and False Negative Authentication System

Arun Malik1 , Suman Sangwan2 , Devender Rathee3 , Vineet Nandal4 , Payal 5

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 922-924, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.922924

Online published on May 31, 2019

Copyright © Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal, “False Positive and False Negative Authentication System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.922-924, 2019.

MLA Style Citation: Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal "False Positive and False Negative Authentication System." International Journal of Computer Sciences and Engineering 7.5 (2019): 922-924.

APA Style Citation: Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal, (2019). False Positive and False Negative Authentication System. International Journal of Computer Sciences and Engineering, 7(5), 922-924.

BibTex Style Citation:
@article{Malik_2019,
author = {Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal},
title = {False Positive and False Negative Authentication System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {922-924},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4339},
doi = {https://doi.org/10.26438/ijcse/v7i5.922924}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.922924}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4339
TI - False Positive and False Negative Authentication System
T2 - International Journal of Computer Sciences and Engineering
AU - Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 922-924
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
292 335 downloads 149 downloads
  
  
           

Abstract

Weak passwords, default passwords in combination with bruteforce attack and dictionary attack are one of the most dangerous combination for security of systems across the globe. False Positive and False Negative Password Authentication System is an attempt to decrease the efficiency of Dictionary, Bruteforce Attack which can be implemented in any authentication system without any significant changes.

Key-Words / Index Term

Bruteforce, Dictionary, Attacks, Botnets, Authentication System

References

[1] Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer 50.7 (2017): 80-84.
[2] “‘BrickerBot’ Results in PDoS Attack,” Radware, 5 Apr. 2017; security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-Service.
[3] S. Edwards and I. Profetis, “Hajime: Analysis of a Decentralized Internet Worm for IoT Devices,” Rapidity Networks; 16 Oct. 2016; security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf.
[4] Antonakakis, Manos, et al. "Understanding the mirai botnet." USENIX Security Symposium. 2017.
[5] De Donno, Michele, et al. "Analysis of DDoS-capable IoT malwares." Computer Science and Information Systems(FedCSIS), 2017 Federated Conference on. IEEE, 2017.
[6] Sharaf-Dabbagh, Y., & Saad, W. “On the authentication of devices in the Internet of things” 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks .
[7] Pinkas, Benny, and Tomas Sander. "Securing passwords against dictionary attacks." Proceedings of the 9th ACM conference on Computer and communications security, ACM, 2002.
[8] John the Ripper password cracker, http://www.openwall.com/john/