Design and implementation of Negative Authentication System
Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensu...
Ausführliche Beschreibung
Autor*in: |
Dasgupta, Dipankar [verfasserIn] Nag, Abhijit Kumar [verfasserIn] Ferebee, Denise [verfasserIn] Saha, Sanjib Kumar [verfasserIn] Subedi, Kul Prasad [verfasserIn] Roy, Arunava [verfasserIn] Madero, Alvaro [verfasserIn] Sanchez, Abel [verfasserIn] Williams, John R. [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: International Journal of Information Security - Springer-Verlag, 2001, 18(2017), 1 vom: 21. Nov., Seite 23-48 |
---|---|
Übergeordnetes Werk: |
volume:18 ; year:2017 ; number:1 ; day:21 ; month:11 ; pages:23-48 |
Links: |
---|
DOI / URN: |
10.1007/s10207-017-0395-8 |
---|
Katalog-ID: |
SPR009132511 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR009132511 | ||
003 | DE-627 | ||
005 | 20201124063521.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201005s2017 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10207-017-0395-8 |2 doi | |
035 | |a (DE-627)SPR009132511 | ||
035 | |a (SPR)s10207-017-0395-8-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Dasgupta, Dipankar |e verfasserin |4 aut | |
245 | 1 | 0 | |a Design and implementation of Negative Authentication System |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. | ||
650 | 4 | |a Cyber-security |7 (dpeaa)DE-He213 | |
650 | 4 | |a Levels of abstraction |7 (dpeaa)DE-He213 | |
650 | 4 | |a Security event |7 (dpeaa)DE-He213 | |
650 | 4 | |a Passwords |7 (dpeaa)DE-He213 | |
650 | 4 | |a Authentication |7 (dpeaa)DE-He213 | |
650 | 4 | |a Negative Authentication |7 (dpeaa)DE-He213 | |
650 | 4 | |a Hashing |7 (dpeaa)DE-He213 | |
650 | 4 | |a Salting |7 (dpeaa)DE-He213 | |
700 | 1 | |a Nag, Abhijit Kumar |e verfasserin |4 aut | |
700 | 1 | |a Ferebee, Denise |e verfasserin |4 aut | |
700 | 1 | |a Saha, Sanjib Kumar |e verfasserin |4 aut | |
700 | 1 | |a Subedi, Kul Prasad |e verfasserin |4 aut | |
700 | 1 | |a Roy, Arunava |e verfasserin |4 aut | |
700 | 1 | |a Madero, Alvaro |e verfasserin |4 aut | |
700 | 1 | |a Sanchez, Abel |e verfasserin |4 aut | |
700 | 1 | |a Williams, John R. |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International Journal of Information Security |d Springer-Verlag, 2001 |g 18(2017), 1 vom: 21. Nov., Seite 23-48 |w (DE-627)SPR009127291 |7 nnns |
773 | 1 | 8 | |g volume:18 |g year:2017 |g number:1 |g day:21 |g month:11 |g pages:23-48 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s10207-017-0395-8 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
951 | |a AR | ||
952 | |d 18 |j 2017 |e 1 |b 21 |c 11 |h 23-48 |
author_variant |
d d dd a k n ak akn d f df s k s sk sks k p s kp kps a r ar a m am a s as j r w jr jrw |
---|---|
matchkey_str |
dasguptadipankarnagabhijitkumarferebeede:2017----:einnipeettoongtvate |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
10.1007/s10207-017-0395-8 doi (DE-627)SPR009132511 (SPR)s10207-017-0395-8-e DE-627 ger DE-627 rakwb eng Dasgupta, Dipankar verfasserin aut Design and implementation of Negative Authentication System 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 Nag, Abhijit Kumar verfasserin aut Ferebee, Denise verfasserin aut Saha, Sanjib Kumar verfasserin aut Subedi, Kul Prasad verfasserin aut Roy, Arunava verfasserin aut Madero, Alvaro verfasserin aut Sanchez, Abel verfasserin aut Williams, John R. verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 18(2017), 1 vom: 21. Nov., Seite 23-48 (DE-627)SPR009127291 nnns volume:18 year:2017 number:1 day:21 month:11 pages:23-48 https://dx.doi.org/10.1007/s10207-017-0395-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 18 2017 1 21 11 23-48 |
spelling |
10.1007/s10207-017-0395-8 doi (DE-627)SPR009132511 (SPR)s10207-017-0395-8-e DE-627 ger DE-627 rakwb eng Dasgupta, Dipankar verfasserin aut Design and implementation of Negative Authentication System 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 Nag, Abhijit Kumar verfasserin aut Ferebee, Denise verfasserin aut Saha, Sanjib Kumar verfasserin aut Subedi, Kul Prasad verfasserin aut Roy, Arunava verfasserin aut Madero, Alvaro verfasserin aut Sanchez, Abel verfasserin aut Williams, John R. verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 18(2017), 1 vom: 21. Nov., Seite 23-48 (DE-627)SPR009127291 nnns volume:18 year:2017 number:1 day:21 month:11 pages:23-48 https://dx.doi.org/10.1007/s10207-017-0395-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 18 2017 1 21 11 23-48 |
allfields_unstemmed |
10.1007/s10207-017-0395-8 doi (DE-627)SPR009132511 (SPR)s10207-017-0395-8-e DE-627 ger DE-627 rakwb eng Dasgupta, Dipankar verfasserin aut Design and implementation of Negative Authentication System 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 Nag, Abhijit Kumar verfasserin aut Ferebee, Denise verfasserin aut Saha, Sanjib Kumar verfasserin aut Subedi, Kul Prasad verfasserin aut Roy, Arunava verfasserin aut Madero, Alvaro verfasserin aut Sanchez, Abel verfasserin aut Williams, John R. verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 18(2017), 1 vom: 21. Nov., Seite 23-48 (DE-627)SPR009127291 nnns volume:18 year:2017 number:1 day:21 month:11 pages:23-48 https://dx.doi.org/10.1007/s10207-017-0395-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 18 2017 1 21 11 23-48 |
allfieldsGer |
10.1007/s10207-017-0395-8 doi (DE-627)SPR009132511 (SPR)s10207-017-0395-8-e DE-627 ger DE-627 rakwb eng Dasgupta, Dipankar verfasserin aut Design and implementation of Negative Authentication System 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 Nag, Abhijit Kumar verfasserin aut Ferebee, Denise verfasserin aut Saha, Sanjib Kumar verfasserin aut Subedi, Kul Prasad verfasserin aut Roy, Arunava verfasserin aut Madero, Alvaro verfasserin aut Sanchez, Abel verfasserin aut Williams, John R. verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 18(2017), 1 vom: 21. Nov., Seite 23-48 (DE-627)SPR009127291 nnns volume:18 year:2017 number:1 day:21 month:11 pages:23-48 https://dx.doi.org/10.1007/s10207-017-0395-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 18 2017 1 21 11 23-48 |
allfieldsSound |
10.1007/s10207-017-0395-8 doi (DE-627)SPR009132511 (SPR)s10207-017-0395-8-e DE-627 ger DE-627 rakwb eng Dasgupta, Dipankar verfasserin aut Design and implementation of Negative Authentication System 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 Nag, Abhijit Kumar verfasserin aut Ferebee, Denise verfasserin aut Saha, Sanjib Kumar verfasserin aut Subedi, Kul Prasad verfasserin aut Roy, Arunava verfasserin aut Madero, Alvaro verfasserin aut Sanchez, Abel verfasserin aut Williams, John R. verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 18(2017), 1 vom: 21. Nov., Seite 23-48 (DE-627)SPR009127291 nnns volume:18 year:2017 number:1 day:21 month:11 pages:23-48 https://dx.doi.org/10.1007/s10207-017-0395-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 18 2017 1 21 11 23-48 |
language |
English |
source |
Enthalten in International Journal of Information Security 18(2017), 1 vom: 21. Nov., Seite 23-48 volume:18 year:2017 number:1 day:21 month:11 pages:23-48 |
sourceStr |
Enthalten in International Journal of Information Security 18(2017), 1 vom: 21. Nov., Seite 23-48 volume:18 year:2017 number:1 day:21 month:11 pages:23-48 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Cyber-security Levels of abstraction Security event Passwords Authentication Negative Authentication Hashing Salting |
isfreeaccess_bool |
false |
container_title |
International Journal of Information Security |
authorswithroles_txt_mv |
Dasgupta, Dipankar @@aut@@ Nag, Abhijit Kumar @@aut@@ Ferebee, Denise @@aut@@ Saha, Sanjib Kumar @@aut@@ Subedi, Kul Prasad @@aut@@ Roy, Arunava @@aut@@ Madero, Alvaro @@aut@@ Sanchez, Abel @@aut@@ Williams, John R. @@aut@@ |
publishDateDaySort_date |
2017-11-21T00:00:00Z |
hierarchy_top_id |
SPR009127291 |
id |
SPR009132511 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR009132511</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063521.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-017-0395-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR009132511</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-017-0395-8-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dasgupta, Dipankar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design and implementation of Negative Authentication System</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber-security</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Levels of abstraction</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security event</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Passwords</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Negative Authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hashing</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Salting</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nag, Abhijit Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferebee, Denise</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saha, Sanjib Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Subedi, Kul Prasad</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roy, Arunava</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Madero, Alvaro</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sanchez, Abel</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, John R.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">18(2017), 1 vom: 21. Nov., Seite 23-48</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:18</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:1</subfield><subfield code="g">day:21</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:23-48</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-017-0395-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">18</subfield><subfield code="j">2017</subfield><subfield code="e">1</subfield><subfield code="b">21</subfield><subfield code="c">11</subfield><subfield code="h">23-48</subfield></datafield></record></collection>
|
author |
Dasgupta, Dipankar |
spellingShingle |
Dasgupta, Dipankar misc Cyber-security misc Levels of abstraction misc Security event misc Passwords misc Authentication misc Negative Authentication misc Hashing misc Salting Design and implementation of Negative Authentication System |
authorStr |
Dasgupta, Dipankar |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)SPR009127291 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
Design and implementation of Negative Authentication System Cyber-security (dpeaa)DE-He213 Levels of abstraction (dpeaa)DE-He213 Security event (dpeaa)DE-He213 Passwords (dpeaa)DE-He213 Authentication (dpeaa)DE-He213 Negative Authentication (dpeaa)DE-He213 Hashing (dpeaa)DE-He213 Salting (dpeaa)DE-He213 |
topic |
misc Cyber-security misc Levels of abstraction misc Security event misc Passwords misc Authentication misc Negative Authentication misc Hashing misc Salting |
topic_unstemmed |
misc Cyber-security misc Levels of abstraction misc Security event misc Passwords misc Authentication misc Negative Authentication misc Hashing misc Salting |
topic_browse |
misc Cyber-security misc Levels of abstraction misc Security event misc Passwords misc Authentication misc Negative Authentication misc Hashing misc Salting |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International Journal of Information Security |
hierarchy_parent_id |
SPR009127291 |
hierarchy_top_title |
International Journal of Information Security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)SPR009127291 |
title |
Design and implementation of Negative Authentication System |
ctrlnum |
(DE-627)SPR009132511 (SPR)s10207-017-0395-8-e |
title_full |
Design and implementation of Negative Authentication System |
author_sort |
Dasgupta, Dipankar |
journal |
International Journal of Information Security |
journalStr |
International Journal of Information Security |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
23 |
author_browse |
Dasgupta, Dipankar Nag, Abhijit Kumar Ferebee, Denise Saha, Sanjib Kumar Subedi, Kul Prasad Roy, Arunava Madero, Alvaro Sanchez, Abel Williams, John R. |
container_volume |
18 |
format_se |
Elektronische Aufsätze |
author-letter |
Dasgupta, Dipankar |
doi_str_mv |
10.1007/s10207-017-0395-8 |
author2-role |
verfasserin |
title_sort |
design and implementation of negative authentication system |
title_auth |
Design and implementation of Negative Authentication System |
abstract |
Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. |
abstractGer |
Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. |
abstract_unstemmed |
Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER |
container_issue |
1 |
title_short |
Design and implementation of Negative Authentication System |
url |
https://dx.doi.org/10.1007/s10207-017-0395-8 |
remote_bool |
true |
author2 |
Nag, Abhijit Kumar Ferebee, Denise Saha, Sanjib Kumar Subedi, Kul Prasad Roy, Arunava Madero, Alvaro Sanchez, Abel Williams, John R. |
author2Str |
Nag, Abhijit Kumar Ferebee, Denise Saha, Sanjib Kumar Subedi, Kul Prasad Roy, Arunava Madero, Alvaro Sanchez, Abel Williams, John R. |
ppnlink |
SPR009127291 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10207-017-0395-8 |
up_date |
2024-07-04T00:47:52.050Z |
_version_ |
1803607418655997953 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR009132511</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063521.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-017-0395-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR009132511</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-017-0395-8-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dasgupta, Dipankar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design and implementation of Negative Authentication System</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber-security</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Levels of abstraction</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security event</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Passwords</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Negative Authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hashing</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Salting</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nag, Abhijit Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferebee, Denise</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saha, Sanjib Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Subedi, Kul Prasad</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roy, Arunava</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Madero, Alvaro</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sanchez, Abel</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, John R.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">18(2017), 1 vom: 21. Nov., Seite 23-48</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:18</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:1</subfield><subfield code="g">day:21</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:23-48</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-017-0395-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">18</subfield><subfield code="j">2017</subfield><subfield code="e">1</subfield><subfield code="b">21</subfield><subfield code="c">11</subfield><subfield code="h">23-48</subfield></datafield></record></collection>
|
score |
7.40281 |