Protecting financial institutions from brute-force attacks

被引:0
|
作者
Herley, Cormac [1 ]
Florencio, Dinei [1 ]
机构
[1] Microsoft Res, Redmond, WA USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We examine the problem, of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password, pairs. Presentation of any of these honeypot credentials causes the attacker to be logged into a honeypot account with fictitious attributes. For the attacker to tell the difference between a honeypot and a real account lie must attempt to transfer money out. We show that is simple to ensure that a brute-force attacker will encounter hundreds or even. thousands of honeypot accounts for every real break-in. His activity in the honeypots provides the data by which the bank learns the attackers attempts to tell real from honeypot accounts, and his cash. out strategy.
引用
收藏
页码:681 / 685
页数:5
相关论文
共 50 条
  • [41] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Yicheng Xu
    Vincent Chau
    Chenchen Wu
    Yong Zhang
    Vassilis Zissimopoulos
    Yifei Zou
    Algorithmica, 2024, 86 : 130 - 146
  • [42] Honey Encryption Encryption beyond the Brute-Force Barrier
    Juels, Ari
    Ristenpart, Thomas
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 59 - 62
  • [43] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Xu, Yicheng
    Chau, Vincent
    Wu, Chenchen
    Zhang, Yong
    Zissimopoulos, Vassilis
    Zou, Yifei
    ALGORITHMICA, 2024, 86 (01) : 130 - 146
  • [44] BAL: A library for the brute-force analysis of dynamical systems
    Linaro, Daniele
    Storace, Marco
    COMPUTER PHYSICS COMMUNICATIONS, 2016, 201 : 126 - 134
  • [45] A New Distributed Brute-Force Password Cracking Technique
    Tirado, Emanuel
    Turpin, Brendan
    Beltz, Cody
    Roshon, Phillip
    Judge, Rylin
    Gagneja, Kanwal
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 117 - 127
  • [46] SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING
    ANANTHARAMAN, T
    CAMPBELL, MS
    HSU, FH
    ARTIFICIAL INTELLIGENCE, 1990, 43 (01) : 99 - 109
  • [47] An efficient brute-force solution to the network reconfiguration problem
    Morton, AB
    Mareels, IMY
    IEEE TRANSACTIONS ON POWER DELIVERY, 2000, 15 (03) : 996 - 1000
  • [48] A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
    Jo, Hyun-Ju
    Yoon, Ji Won
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [49] Key Transferring-Based Secure Deduplication for Cloud Storage With Resistance Against Brute-Force Attacks
    Tang, Xin
    Jin, Luchao
    Bai, Jing
    Shi, Linjie
    Zhu, Yudan
    Cui, Ting
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 860 - 876
  • [50] An Algorithm for String Searching Based on Brute-Force Algorithm
    Abdeen, Rawan Ali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (07): : 24 - 27