Inverse Cookie-based Virtual Password Authentication Protocol
نویسندگان
چکیده
Password is the most commonly used authentication technique to authenticate the users on the web. Password based authentication protocols are susceptible to dictionary attacks by means of automated programs because most of the user chosen passwords are limited to the user’s personal domain. In this paper, we propose an inverse cookie based virtual password authentication protocol that preserves the advantages of basic password authentication and simultaneously increasing the efforts required for online dictionary attacks. The Web server stores the cookie on the client’s computer when the client has not submitted correct identity and password for its authentication to the Web server. The legitimate client can easily authenticate itself to the Web server from any computer irrespective of whether that computer contains cookie or not. However, the computational efforts required from the attacker during login on to the Web server increases with each login failure. The client generated virtual password is different for the same user in different sessions of Secure Socket Layer (SSL) protocol. The concept used in this paper is to combine traditional password authentication with a challenge that is easy to answer by the legitimate client and the computational cost of authentication increases for the attacker with each login failure. Therefore, even the automated programs can not launch online dictionary attacks on the proposed protocol. This protocol provides better protection against different types of attacks launched by the attacker. The proposed protocol is easy to implement and it removes some of the deficiencies of previously suggested password based authentication protocols.
منابع مشابه
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 certificate followed by the authentication of the user either with own password or with some cookie stored within the user’s browser. Unfortunately, this solution is susceptible to various impersonation attacks such as ...
متن کاملSpyware Resistant Web Authentication Using Virtual Machines
Password collection by keyloggers and related malware is increasing at an alarming rate. We investigate client-only defenses and methods that require server-side assistance. Password hashing and password injection, in which passwords are isolated from spyware, provide protection against phishing, commonpassword attacks, and spyware on the client platform. To protect against network sniffing and...
متن کاملGetting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords
We outline an end-to-end password authentication protocol for the web designed to be stateless and as secure as possible given legacy limitations of the web browser and performance constraints of commercial web servers. Our scheme is secure against very strong but passive attackers able to observe both network traffic and the server’s database state. At the same time, our scheme is simple for w...
متن کاملSecurity for Password Based Systems Using Multi Authentication Process
Online Guessing attacks on Password Based Systems are inevitable and commonly observed against Web Applications. Server Verifies User Name from the Cookie of the User’s Machine, System IP, Catcha, Password of the User, Number of Failure Attempts by the User, Web Browser. This Process of Verification is called as Automated Turing Tests (ATT). Authentication of User will start by asking Secret Qu...
متن کاملA Single Sign-On Protocol for Distributed Web Applications Based on standard Internet Mechanisms
Growing e-commerce and personalized Web sites require users to set up many different personal accounts. Personal data has to be entered many times and each user has to memorize different username and password combinations. This reduces system security as users tend to either use passwords that are very easy to guess, or they write them down, or they use the same password for many different acco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 13 شماره
صفحات -
تاریخ انتشار 2011