Protecting financial institutions from brute-force attacks

被引:0
|
作者
Herley, Cormac [1 ]
Florencio, Dinei [1 ]
机构
[1] Microsoft Res, Redmond, WA USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We examine the problem, of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password, pairs. Presentation of any of these honeypot credentials causes the attacker to be logged into a honeypot account with fictitious attributes. For the attacker to tell the difference between a honeypot and a real account lie must attempt to transfer money out. We show that is simple to ensure that a brute-force attacker will encounter hundreds or even. thousands of honeypot accounts for every real break-in. His activity in the honeypots provides the data by which the bank learns the attackers attempts to tell real from honeypot accounts, and his cash. out strategy.
引用
收藏
页码:681 / 685
页数:5
相关论文
共 50 条
  • [31] Generation and evaluation of brute-force signature forgeries
    Wahl, Alain
    Hennebert, Jean
    Humm, Andreas
    Ingold, Rolf
    MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 2 - 9
  • [32] "REGRESSION ANYTIME" WITH BRUTE-FORCE SVD TRUNCATION
    Bender, Christian
    Schweizer, Nikolaus
    ANNALS OF APPLIED PROBABILITY, 2021, 31 (03): : 1140 - 1179
  • [33] A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures
    Dogruluk, Ertugrul
    Macedo, Joaquim
    Costa, Antonio
    ELECTRONICS, 2022, 11 (08)
  • [34] LHC teams turn to brute-force hunt
    Castelvecchi, Davide
    NATURE, 2018, 560 (7718) : 293 - 294
  • [35] BRUTE-FORCE SEARCH OF FAST CONVOLUTION ALGORITHMS
    Haynal, Steve
    Haynal, Heidi
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2586 - 2590
  • [36] SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING
    ANANTHARAMAN, T
    CAMPBELL, M
    HSU, FH
    ICCA JOURNAL, 1988, 11 (04): : 135 - 143
  • [37] Honey Encryption: Security Beyond the Brute-Force Bound
    Juels, Ari
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 293 - 310
  • [38] Fast Network-Based Brute-Force Detection
    Koch, Robert
    Rodosek, Gabi Dreo
    EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012), 2012, : 184 - 190
  • [39] PUMP CONTROLS FINESSE BRUTE-FORCE DESIGN.
    Bagat, Arjun
    Orban, Paul
    Hydraulics and Pneumatics, 1985, 38 (05): : 53 - 56
  • [40] InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication
    Chen, Yu
    Yu, Yang
    Zhai, Lidong
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2027 - 2041