[ ANÁLISIS, INCIDENCIA Y MITIGACIÓN DE UN ATAQUE BASADO EN DICCIONARIO ]
Volume 17, Issue 3, August 2016, Pages 872–883
Alfonso Aníbal Guijarro Rodríguez1, Lorenzo Jeovanny Cevallos Torres2, and David Xavier Cardenas Giler3
1 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
2 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
3 Carrera de Ingeniería en Sistemas Administrativo Computarizado, Facultad de Ciencias Administrativas, Universidad de Guayaquil, Ecuador
Original language: Spanish
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The negligence of network administrators haves let intruders affect computer systems, generating significant losses in business. The most common security threats to computer crimes are aimed at obtaining privileged access to the system through dictionary-based attacks or brute force. The research analyzes the growth curve that has experienced in the last 5 years this technique and explains why its growth and popularity, detailing its performance, implementation process and to the extent that could compromise an organization if successful. Traditional methodologies considered essential to install multiple software tools to mitigate this threat managing to control, adjust and monitor internal security policies reducing network vulnerabilities. This document is intended to reduce the chances of success and the impact caused by attacks based on dictionary, for this a test scenario was created with virtualization tools, and additionally social engineering is explained as a primary factor in the development of this attack finally necessary security stockings were implemented to mitigate this crime.
Author Keywords: Unauthorized access, dictionary attack, credentials, brute force, password , Informatic security, vulnerabilities.
Volume 17, Issue 3, August 2016, Pages 872–883
Alfonso Aníbal Guijarro Rodríguez1, Lorenzo Jeovanny Cevallos Torres2, and David Xavier Cardenas Giler3
1 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
2 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
3 Carrera de Ingeniería en Sistemas Administrativo Computarizado, Facultad de Ciencias Administrativas, Universidad de Guayaquil, Ecuador
Original language: Spanish
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
The negligence of network administrators haves let intruders affect computer systems, generating significant losses in business. The most common security threats to computer crimes are aimed at obtaining privileged access to the system through dictionary-based attacks or brute force. The research analyzes the growth curve that has experienced in the last 5 years this technique and explains why its growth and popularity, detailing its performance, implementation process and to the extent that could compromise an organization if successful. Traditional methodologies considered essential to install multiple software tools to mitigate this threat managing to control, adjust and monitor internal security policies reducing network vulnerabilities. This document is intended to reduce the chances of success and the impact caused by attacks based on dictionary, for this a test scenario was created with virtualization tools, and additionally social engineering is explained as a primary factor in the development of this attack finally necessary security stockings were implemented to mitigate this crime.
Author Keywords: Unauthorized access, dictionary attack, credentials, brute force, password , Informatic security, vulnerabilities.
How to Cite this Article
Alfonso Aníbal Guijarro Rodríguez, Lorenzo Jeovanny Cevallos Torres, and David Xavier Cardenas Giler, “ANALYSIS, INCIDENCE AND MITIGATION OF A DICTIONARY-BASED ATTACK,” International Journal of Innovation and Applied Studies, vol. 17, no. 3, pp. 872–883, August 2016.