A Survey on Password Stealing Attacks and Its Protecting Mechanism

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2015 by IJETT Journal
Volume-19 Number-4
Year of Publication : 2015
Authors : Venkadesh .S , K.Palanivel
DOI :  10.14445/22315381/IJETT-V19P239


Venkadesh .S , K.Palanivel "A Survey on Password Stealing Attacks and Its Protecting Mechanism", International Journal of Engineering Trends and Technology (IJETT), V19(4), 223-226 Jan 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


People enjoy the convenience of on-line services, however on-line environments might bring several risks. In the on-line communication, the password has a crucial role to secure user personal details. These passwords are taken to be secure and it should be retain in person. The third person might take a password without knowledge of original user and they might do any dishonest activities on the victim’s account. The passwords are taken by using anyone of the attack mechanism like Phishing attack, password Stealing Program Attack and etc… The user may use personal details in on-line setting. These personal details should be secured. There are many types of mechanisms available to secure the password and user’s information. This paper makes a survey concerning such forms of protection mechanisms and brings awareness to the people


[1] [Online].Available:http://en.wikipedia.org/wiki/Phishing
[2] Anti-Phishing Working Group. [Online]. Available:http://www.antiphishing.org
[3] [Online].Available: http://en.wikipedia.org/wiki/Key${-}$logger
[4] S. Furnell, “An assessment of website password practices,” Computers & Security, 26(7-8), December 2007, pp. 445-451.
[5] Microsoft whitepaper, “Strong passwords: How to create and use them,” 2006, Accessed Jan. 31, 2008,Available at: http://www.microsoft.com/protect/yourself/password/create.mspx.
[6] Abdalla.M, Bresson.E, Chevassut.O, Moller.B and Pointcheval.D,“Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol”, Int.J.Security Netw., vol. 2, nos.3-4,pp. 284-296, 2007.
[7] Fathy. A, ElBatt.T and Youssef.M “A Source Authentication Scheme Using Network coding”, Int.J.Security Netw., vol. 6, nos.2-3, pp.123-135, 2011.
[8] Herley.C and Florencio.D, “How to login from an internet café without worrying about keyloggers”, in proc. SOUPS, 2006.
[9] One-Time Password [Online]. Available:http://en.wikipedia.org/wiki/One-time?password.
[10] Perrig.A, Szewczyk.R, Tygar.J.D, Wen.V and Culler D.E,”SPINS: Security Protocols for Sensor Networks”,Wirel.Netw., vol. 6, no. 5, pp. 521-534, 2002.
[11] Widenbeck.S, Waters.J, Sobrado.L, and Birget.J, ”Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme”, in Proc. Working Conf.Adv. Vis.Interfaces.
[12] Yang Xiao, Chung-Chih Li, Ming Lei, and Susan V. Vrbsky, ” Differentiated Virtual Passwords, Secret LittleFunctions, and Codebooks for Protecting Users From Password Theft” Systems Journal, IEEE

Phishing Attack, Password Stealing Program Attack, Shoulder-Surfing Attack, Password Management Practices