Enhancing LSB Algorithm against Brute-Force Attack using ASCII Mapping Technique
نویسندگان
چکیده
منابع مشابه
Flow-based Brute-force Attack Detection
Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing volume and encryption of network traffic and growing ubiquity of high-speed networks. Although the research in this field advanced considerably, there still remain classes of attacks that are undetectable. In this chapter, we present several methods for the detection...
متن کاملBrute Force Works Best Against Bullying
The problem of harmful and offending messages on the Internet has existed for many years. One of the reasons such activities evolved was the anonymity of communication on the Internet, giving users the feeling that anything can go unpunished. Recently the problem has been officially defined and labeled as cyberbullying (CB)1. In Japan the problem has become serious enough to be noticed by the M...
متن کاملAn Analysis of Markov Password Against Brute Force Attack for Effective Web Applications
Computer is omnipresent. With massive growth in the field of computers, advancement in digital technology, development in software’s gives improvement to computer field on one side. Hacking the systems and cracking the login Passwords makes the field in endure on the other hand. Authentication to access an application in networks is mostly based on alphanumeric Password. A novel method of Alpha...
متن کاملA Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment
The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...
متن کاملBrute Force Attack on UNIX Passwords with SIMD Computer
As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to “crack” a large fraction of pas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Engineering and Applied Sciences
سال: 2019
ISSN: 1816-949X
DOI: 10.36478/jeasci.2019.5854.5863