Frequency of occurrence analysis attack and its countermeasure
نویسنده
چکیده
This paper addresses a newly discovered security threat named Frequency of Occurrence Analysis (FOA) attack in searchmetics password authentication scheme. A countermeasure technique that utilises Metaheuristic Randomisation Algorithm (MRA) is proposed to address the FOA attack. The proposed Algorithm is presented and an offline FOA attack simulation tool is developed to verify the effectiveness of the proposed method. In addition, a shoulder surfing testing is conducted to evaluate the effectiveness of the proposed method in terms of mitigating shoulder surfing attack. The experiment results show that MRA is able to prevent FOA and mitigate shoulder surfing attacks. Moreover, the proposed method is able to provide larger password space compare to the benchmarking scheme.
منابع مشابه
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملLow Cost Countermeasure at Authentication Protocol Level against Electromagnetic Side Channel Attacks on RFID Tags
Radio Frequency Identification (RFID) technology is widely spread in many security applications. Producing secured low-cost and low-power RFID tags is a challenge. The used of lightweight encryption algorithms can be an economic solution for these RFID security applications. This article proposes low cost countermeasure to secure RFID tags against Electromagnetic Side Channel Attacks (EMA). Fir...
متن کاملInvestigations of Radio Behavior and Security Threats in Cognitive Radio Networks
Cognitive radio (CR) has been an active research topic in wireless communications. In this dissertation, radio behavior and potential security threats in cognitive radio networks are investigated in order to successfully deploy CR networks and realize its benefits. We study complex CR misuse issues during its secondary access processes, including misbehavior, cheating, and attack. Different cou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. Arab J. Inf. Technol.
دوره 10 شماره
صفحات -
تاریخ انتشار 2013