Skip to main navigation Skip to search Skip to main content

Robust Password Security: A Method in Preventing Guessing Attacks and Authenticating Users

  • Tonmoy Ghosh
  • , Md Mehedi Hasan
  • , Charan Gudla
  • , Md Shohel Rana
  • , Feroz Ahmed
  • Daffodil International University
  • Southeast University
  • Mississippi State University
  • University of Massachusetts Dartmouth

Research output: Contribution to book or proceedingConference articlepeer-review

Abstract

The upward trajectory of information systems is marked by constant growth. Despite its widespread use, the enduring challenge of guessing attacks necessitates robust countermeasures. Current solutions, marked by diverse mechanisms and limited transparency, fail to provide real-time effective-ness. These countermeasures often implement thresholds that, upon repeated attempts, lead to the blocking of individuals. However, a drawback arises in the potential to mistakenly block benign users, thereby compromising usability for those lacking malicious intent. This paper introduces an innovative approach to address these challenges, meticulously exploring benign user scenarios to enhance the precision of guessing attack identification. Our proposed method involves breaking user passwords into distinct blocks, utilizing various features such as password length, component order, keyboard layout, real-time and historical attempt patterns, failed login history, and scheduled logins to differentiate hazardous attempts from innocuous ones. This proposed mechanism distinguishes itself through its simplicity and efficacy compared to state-of-the-art solutions. It balances security, usability, and functionality, offering a streamlined implementation to address the evolving complexities of authentication in information systems.
Original languageAmerican English
Title of host publication2025 8th International Conference on Information and Computer Technologies (ICICT)
PublisherIEEE
Pages49-54
Number of pages6
ISBN (Print)979-8-3315-0519-6
DOIs
StatePublished - Mar 16 2025
Event2025 8th International Conference on Information and Computer Technologies (ICICT) - Hawaii-Hilo, HI, USA
Duration: Mar 14 2025Mar 16 2025

Conference

Conference2025 8th International Conference on Information and Computer Technologies (ICICT)
Period03/14/2503/16/25

Keywords

  • Privacy
  • Layout
  • Keyboards
  • Passwords
  • Real-time systems
  • Trajectory
  • History
  • Usability
  • Protection
  • Information systems

Fingerprint

Dive into the research topics of 'Robust Password Security: A Method in Preventing Guessing Attacks and Authenticating Users'. Together they form a unique fingerprint.

Cite this