Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers
[Full Text]
AUTHOR(S)
Mohammed Farik, ABM Shawkat Ali
KEYWORDS
Index Terms: Algorithm, brute-force, entropy, passwords, 802.11ac router
ABSTRACT
Abstract: Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.
REFERENCES
[1] D. Florencio and C. Herley, “A large-Scale Study of Web Password Habits”, Microsoft Research, Proc. WWW 2007, Banff, BC. [Online]. Available: http://research.microsoft.com/pubs/74164/www2007.pdf [Accessed 10 April 2014].
[2] M. Choi, RJ. Robles, C. Hong), T. Kim, “Wireless Network Security: Vulnerabilities, Threats, Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 3, July, 2008.
[3] E.N. Lorente, C. Meijer, R. Verdult, “Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers”. [Online]. Available: https://www.usenix.org/system/files/conference/woot15/woot15-paper-lorente.pdf [Accessed 10 April 2014].
[4] P. Szewczyk, “The ADSL Router Forensics Process”, Edith Cowan University Research Online, ECU Publications Pre. 2011, 2010. [Online]. Available: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=7481&context=ecuworks [Accessed 10 April 2014].
[5] M. Farik, "Improving Network Security: An Alogrithm to Enforce Strong Router Password," a minor thesis accepted in partial fulfilment of MInfTech degree at The University of Fiji, 2014.
[6] M. Farik and A. Ali, "Recurrent Security Gaps in IEEE 802.11ac Routers," International Journal of Scientific and Technology Research, vol. 4, no. 9, 2015.
[7] M. Farik and S. Ali, "Analysis of Default Passwords in Routers against Brute-Force Attack," International Journal of Scientific and Technology Research, vol. 4, no. 9, 2015.
[8] "RouterPasswords," [Online]. Available: http://www.routerpasswords.com. [Accessed 10 April 2014].
[9] "Interpreting the Calculation," [Online]. Available: http://passwordstrengthcalculator.org/interpret.php. [Accessed 10 April 2014].
[10] "Estimate password strength and survivability," [Online]. Available: http://passwordstrengthcalculator.org/index.php. [Accessed 10 April 2014].
|