IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 10, October 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

[Full Text]

 

AUTHOR(S)

Mohammed Farik, ABM Shawkat Ali

 

KEYWORDS

Index Terms: Algorithm, brute-force, entropy, passwords, 802.11ac router

 

ABSTRACT

Abstract: Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

 

REFERENCES

[1] D. Florencio and C. Herley, “A large-Scale Study of Web Password Habits”, Microsoft Research, Proc. WWW 2007, Banff, BC. [Online]. Available: http://research.microsoft.com/pubs/74164/www2007.pdf [Accessed 10 April 2014].

[2] M. Choi, RJ. Robles, C. Hong), T. Kim, “Wireless Network Security: Vulnerabilities, Threats, Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 3, July, 2008.

[3] E.N. Lorente, C. Meijer, R. Verdult, “Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers”. [Online]. Available: https://www.usenix.org/system/files/conference/woot15/woot15-paper-lorente.pdf [Accessed 10 April 2014].

[4] P. Szewczyk, “The ADSL Router Forensics Process”, Edith Cowan University Research Online, ECU Publications Pre. 2011, 2010. [Online]. Available: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=7481&context=ecuworks [Accessed 10 April 2014].

[5] M. Farik, "Improving Network Security: An Alogrithm to Enforce Strong Router Password," a minor thesis accepted in partial fulfilment of MInfTech degree at The University of Fiji, 2014.

[6] M. Farik and A. Ali, "Recurrent Security Gaps in IEEE 802.11ac Routers," International Journal of Scientific and Technology Research, vol. 4, no. 9, 2015.

[7] M. Farik and S. Ali, "Analysis of Default Passwords in Routers against Brute-Force Attack," International Journal of Scientific and Technology Research, vol. 4, no. 9, 2015.

[8] "RouterPasswords," [Online]. Available: http://www.routerpasswords.com. [Accessed 10 April 2014].

[9] "Interpreting the Calculation," [Online]. Available: http://passwordstrengthcalculator.org/interpret.php. [Accessed 10 April 2014].

[10] "Estimate password strength and survivability," [Online]. Available: http://passwordstrengthcalculator.org/index.php. [Accessed 10 April 2014].