|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
Viadeo
|
English
|
Français
|
Español
|
العربية
|
 
International Journal of Innovation and Applied Studies
ISSN: 2028-9324     CODEN: IJIABO     OCLC Number: 828807274     ZDB-ID: 2703985-7
 
 
Wednesday 04 December 2024

About IJIAS

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJIAS

  Now IJIAS is indexed in EBSCO, ResearchGate, ProQuest, Chemical Abstracts Service, Index Copernicus, IET Inspec Direct, Ulrichs Web, Google Scholar, CAS Abstracts, J-Gate, UDL Library, CiteSeerX, WorldCat, Scirus, Research Bible and getCited, etc.  
 
 
 

ANALYSIS, INCIDENCE AND MITIGATION OF A DICTIONARY-BASED ATTACK


[ ANÁLISIS, INCIDENCIA Y MITIGACIÓN DE UN ATAQUE BASADO EN DICCIONARIO ]

Volume 17, Issue 3, August 2016, Pages 872–883

 ANALYSIS, INCIDENCE AND MITIGATION OF A DICTIONARY-BASED ATTACK

Alfonso Aníbal Guijarro Rodríguez1, Lorenzo Jeovanny Cevallos Torres2, and David Xavier Cardenas Giler3

1 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
2 Carrera de Ingeniería en Sistemas Computacionales, Facultad de Ciencias Matemáticas y Físicas, Universidad de Guayaquil, Ecuador
3 Carrera de Ingeniería en Sistemas Administrativo Computarizado, Facultad de Ciencias Administrativas, Universidad de Guayaquil, Ecuador

Original language: Spanish

Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


The negligence of network administrators haves let intruders affect computer systems, generating significant losses in business. The most common security threats to computer crimes are aimed at obtaining privileged access to the system through dictionary-based attacks or brute force. The research analyzes the growth curve that has experienced in the last 5 years this technique and explains why its growth and popularity, detailing its performance, implementation process and to the extent that could compromise an organization if successful. Traditional methodologies considered essential to install multiple software tools to mitigate this threat managing to control, adjust and monitor internal security policies reducing network vulnerabilities. This document is intended to reduce the chances of success and the impact caused by attacks based on dictionary, for this a test scenario was created with virtualization tools, and additionally social engineering is explained as a primary factor in the development of this attack finally necessary security stockings were implemented to mitigate this crime.

Author Keywords: Unauthorized access, dictionary attack, credentials, brute force, password , Informatic security, vulnerabilities.


How to Cite this Article


Alfonso Aníbal Guijarro Rodríguez, Lorenzo Jeovanny Cevallos Torres, and David Xavier Cardenas Giler, “ANALYSIS, INCIDENCE AND MITIGATION OF A DICTIONARY-BASED ATTACK,” International Journal of Innovation and Applied Studies, vol. 17, no. 3, pp. 872–883, August 2016.