A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication

Passwords play an important role in daily life in various computing applications like ATM machines, internet services, windows login, authentication in mobiles etc. The major aim for using passwords is to restrict unauthorized users to access the system. Passwords are necessary but, still they are not considered much safe to provide the security to the users because of many flaws in the conventional password systems. A large number of attacks on many systems are related to the passwords. This paper describes password attacks and comparative analysis of different authentication methods for awareness of attacks and selection of authentication method in a particular scenario.

[1]  David G. Stork,et al.  Pattern Classification , 1973 .

[2]  Tai-Hoon Cho Pattern Classification Methods for Keystroke Analysis , 2006, 2006 SICE-ICASE International Joint Conference.

[3]  I. Traore,et al.  Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[4]  M. Abadi Strengthening Passwords , 1997 .

[5]  D. Signorini,et al.  Neural networks , 1995, The Lancet.

[6]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[7]  Jirí Benes,et al.  On neural networks , 1990, Kybernetika.