首页> 外文会议>IEEE European Symposium on Security and Privacy >StopGuessing: Using Guessed Passwords to Thwart Online Guessing
【24h】

StopGuessing: Using Guessed Passwords to Thwart Online Guessing

机译:StopGuessing:使用猜测的密码阻止在线猜测

获取原文

摘要

Practitioners who seek to defend password-protected resources from online guessing attacks will find a shortage of tooling and techniques to help them. Little research suggests anything beyond blocking or throttling traffic from IP addresses sending suspicious traffic; counting failed authentication requests, or some variant, is often the sole feature used to determine suspicion. In this paper we show that several other features can greatly help distinguishing benign and attack traffic. First, we increase the penalties for clients responsible for fail events involving passwords frequently-guessed by attackers. Second, we reduce the threshold (and thus protect better) for accounts with weak passwords. Third, we detect, and are more forgiving of, login failures caused by users mistyping their passwords. Most importantly, we achieve all of these goals without needing any marker that indicates weak accounts, changing the format in which passwords are stored (i.e. we do not store passwords plaintext or in any recoverable form), or storing any information that might be harmful if leaked. We present an open-source implementation of this system and demonstrate its improvement over simpler blocking strategies in various simulated scenarios.
机译:试图保护受密码保护的资源免遭在线猜测攻击的从业者将发现缺乏帮助他们的工具和技术。很少有研究表明除了阻止或限制来自发送可疑流量的IP地址的流量外,还没有其他方法。计数失败的身份验证请求或某些变体通常是用于确定可疑性的唯一功能。在本文中,我们证明了其他几个功能可以极大地帮助区分良性和攻击性流量。首先,我们加大了对失败事件负责的客户的处罚,这些失败事件涉及攻击者经常猜测的密码。其次,我们降低了密码较弱的帐户的阈值(从而更好地保护了帐户)。第三,我们检测到用户误输入密码而导致的登录失败,并且可以宽恕。最重要的是,我们无需使用任何标志即可表明帐户漏洞,无需更改密码存储格式(即我们不以明文形式或可恢复形式存储密码)或存储任何可能对用户造成伤害的信息,就可以实现所有这些目标泄漏了。我们提供了该系统的开源实现,并展示了其在各种模拟情况下相对于更简单的阻止策略的改进。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号