期刊文献+

用启发式策略检测口令安全

Improving password security with heuristic method
下载PDF
导出
摘要 针对现有口令安全措施中存在的问题进行了分析,提出一种利用启发式策略检测口令安全的方法,该方法模拟社交工程破解口令的逻辑推理过程,利用启发式策略指导口令核的检测过程,从而有针对性的选择口令核字典,缩小搜索空间,再利用计算机的强计算能力完成变形重组工作,提高效率.以攻击者的思维、角度来考虑安全问题,假定攻击者在了解用户有关信息的情况下,模拟攻击者破解口令的智能推导过程来检验口令的安全性.同时,还描述了利用此方法实现的一个原型系统,实验表明,它可以改进口令检测的效果和效率. A new model is proposed for improving password security with a heuristic method which tries to find out the password core by reasoning just like a hacker usually does in social engine and then transforms the password core into kinds of passwords to check whether the right one is in them. With this model the design and implementation of an audit tool called PassChecker are described. With this method the PassChecker can improve the efficiency and efficacy of checking weak passwords.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2004年第4期529-533,共5页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:90204014).
关键词 口令安全 攻击者 破解 启发式 原型系统 计算机 搜索空间 策略 进口 缩小 password security heuristic strategy password core direct clue indirect clue
  • 相关文献

参考文献10

  • 1Eric Cole. Hackers beware [M]. Indianapolis, Indiana: New Riders, 2001.
  • 2SANS. The twenty most critical Internet security vulnerabilities [J/OL]. http://www.sans.org/top20.htm, 2003-08-20.
  • 3Scott Higgins. Physical penetrations: the art of advanced social engineering [J/OL]. http://www.totse.com/en/hack/introduction_to_hacking/alt2600.html, 2003-09-19.
  • 4Daniel V K. Foiling the cracker: a survey of and improvements to, password security [J/OL]. http://www.deter.com/unix/papers/passwords_klein.pdf, 2002-12-05.
  • 5FIPS PUB 181. Automated password generator [C/OL]. Federal Information Processing Standards Publication. http://www.itl.nist.gov/fipspubs/fip181.htm, 1993-06-10.
  • 6Jonathan Littmann. The fugitive game [M]. Boston, MA: Little, Brown and Co, 1997.
  • 7Knightmare. The secrets of a super hacker. Port townsend [M]. WA: Loompanics Ltd, 1994.
  • 8Alec Muffett. Crack [CP/OL]. ftp://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/crack, 2002-11-22.
  • 9Solar Designer. John the ripper [CP/OL]. http://www.bulleye.net/tools/crackers/john.zip, 2002-10-20.
  • 10Hendrich F N. Hades [CP/OL]. http://tech-www.informatik.uni-hamburg.de/applets/hades/, 2002-06-11.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部