• Title/Summary/Keyword: password testing

Search Result 6, Processing Time 0.017 seconds

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

Keystroke Application Technique for User Authentication in E-Learning System (이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.25-31
    • /
    • 2008
  • It is important for users to be confirming in e-Leaning system, because legitimate learner should be joined to the system for teaming and testing Thus, most system for authentication was verified using id and password with learner's id and password. In this case, It can be easy for hackers to steal learner's id and password. In addition, soma learner gets another to sit for the examination for one with another person id and password. For the solution like this problem it needs a biometrics authentication for complement. This method is required so much extra cost as well as are an unwanted concern. Therefore, we proposed keystroke technique to decide which learners are righteous or unlawful in this paper. In addition, we applied statistics and neural network for the performance of keystroke system. As a result, the performance of FAR and FRR in keystroke authentication was increased by proposed method.

Design and Implementation of the English Education Testing System Interface Based on VoiceXML (VoiceXML 기반 영어 교육 평가 시스템 설계 및 구현)

  • Jang, Seung Ju
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.75-83
    • /
    • 2005
  • In this paper we studied English listening and speaking test part of foreign language using web and VoiceXML-based education testing system, which is irrespective of time and space. The testing system interface based on VoiceXML consists of user registration module, testing module, and testing result module. User registration module registers user's name and ID, password in user database, and when a tester calls for testing, the User listens to the telephone sound supported by vxml scenario. After that, if a tester logs in, the tester is verified, In the VoiceXML-based education testing system, the manager can reduce time and effort for gaining testing result. The tester listens to the voice by scenario supported by VoiceXML markup language using wire/wireless telephone at any time or anywhere and can improve the effect of foreign language studying by valuating in voice directly. verified. In the VoiceXML-based education testing system, the manager can reduce time and effort for gaining testing result. The tester listens to the voice by scenario supported by VoiceXML markup language using wire/wireless telephone at any time or anywhere and can improve the effect of foreign language studying by valuating in voice directly.

  • PDF

A Study on the Development Process of User Authentication Software (사용자 인증 소프트웨어 개발 프로세스에 관한 연구)

  • 이상준;배석찬
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.255-268
    • /
    • 2004
  • User authentication is indispensable in computer login and internet banking. Usability as well as security is needed in user authentication software. To develop the software systematically, development process must be defined, and it can result in the improvement of software maturity. In this paper, a process needed to develop user authentication software systematically is proposed from experience of developing visual password input software. This process is composed of 6 phases and 15 activities. It is able to improve usability with its requirement analysis, planning, integration testing, and acceptance testing activity.

  • PDF

Penetration Testing and Network Auditing: Linux

  • Stiawan, Deris;Idris, Mohd. Yazid;Abdullah, Abdul Hanan
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.104-115
    • /
    • 2015
  • Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.