Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Markov Chain Password using Bayesian Inference

S. Vaithyasubramanian, A. Christy

Abstract


Passwords are the primary line of security against unlawful access to computer. Password security is fundamental to the protection of information systems. It is sound acknowledged truth that user chosen passwords are to some extent predictable. To make it unpredictable user can create Markov chain based passwords. This paper discusses about the analysis on passwords created using Markov Chain and Comparative analysis with common passwords. Bayesian Principle has been successfully used to analyze the strength and weakness of Markov chain passwords.

Keywords


Information Security, Passwords, Alphanumeric Password, Markov Password, Bayes Theorem, Bayesian Inference.

Full Text:

PDF

References


http://news.yahoo.com/website-tells-passwords-leaked-171334441.html/2013.

http://news.cnet.com/8301-1009_3-57448079-83/millions-of-linkedin-passwords-reportedly-leaked-online/2012.

http://www.bbc.co.uk/news/technology-18338956/2012.

http://globalnews.ca/news/1009800/stolen-facebook-linkedin-google-passwords-leaked-online/2013.

S.Vaithyasubramanian, A. Christy “A Scheme to Create Secured Random Password using Markov Chain” Accepted for International Conference on Artificial intelligence and Evolutionary Algorithms in Engineering Systems – 2014(ICAEES 2014).

S.Vaithyasubramanian, A. Christy “Bayesian Inference Based Intrusion Detection” Proceedings of the national conference on Mathematical and Computational Modeling, June 2012, Page No.153 -157.

Ion Androutsopoulos, et.al “Learning to filter spam E-mail A comparison of Naïve Bayesian and a Memory-based Approach” 4th European conference on principles and practice of knowledge discovery in database, Sep 2000, Page No. 1-13.

G. Bhagyashri, “Auto E-mail Classification using Bayesian Filter” International journal of Advanced Technology & Engineering Research, Vol 3, Issue 4, July 2013.

Edward F. Gehringer “Choosing passwords: Security and Human factors” IEEE 2002 international symposium on Technology and Society, (ISTAS’02), ISBN 0-7803-7284-0, Page No. 369 – 373.

Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant “Password Memorability and Security: Empirical Results” IEEE security & privacy Vol: 2, Issue: 5, 2004, Page No. 25 – 31.

Dinei Florencio, Cormac Herley, Baris Coskun “Do strong Web passwords accomplish anything?” Proceeding HOTSEC'07 Proceedings of the 2nd USENIX workshop on hot topics in security, ACM Digital Library, 2007.

Dinei Florencio, Cormac Herley “ A Large-Scale Study of Web Password Habits” Proceedings of the 16th international conference on the World Wide Web, ACM Digital Library, 2007, Page No. 657-666.

Bander AlFayyadh, Per Thorsheim, Audun Josang and Henning Klevjer “Improving Usability of Password Management with Standardized

Password Policies” The Seventh Conference on Network and Information Systems Security - SAR-SSI 2012 Cabourg, May 2012, ISBN 978-2-9542630-0-7.

Sharifah Mumtazah Syed Ahmad, et al “Technical Issues and Challenges of Biometric Applications as access control tools of Information Security” International Journal of Innovative Computing, Information and Control Volume 8, Number 11, November 2012, ISSN 1349-4198, Page No. 7983 – 7999.

Haichang Gao, Wei Jia, Fei Ye, Licheng Ma “A survey on the use of Graphical Passwords in Security”, Journal of software, Vol 8, No.7, July 2013.

Monika Bhatnagar, Raina K. Jain, Nilam S. Khairnar “A Survey on Behavioral Biometric Techniques: Mouse vs. Keyboard Dynamics”, IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology 2013, Page No. 27 -30.

Jason Hong “Passwords Getting Painful, Computing Still Blissful” Communications of the ACM I MARCH 2013 I Vol.56 I No. 3.

http://resources.infosecinstitute.com/dictionary-attack-using-burp-suite.


Refbacks

  • There are currently no refbacks.