Show simple item record

dc.contributor.authorDasgupta, Dipankar
dc.contributor.authorFerebee, Denise
dc.contributor.authorRoy, Arunava
dc.contributor.authorMadero, Alvaro
dc.contributor.authorSanchez, Abel
dc.contributor.authorNag, Abhijit Kumar
dc.contributor.authorSaha, Sanjib Kumar
dc.contributor.authorSubedi, Kul Prasad
dc.contributor.authorWilliams, John R
dc.date.accessioned2019-03-15T19:52:30Z
dc.date.available2019-03-15T19:52:30Z
dc.date.issued2017-11
dc.identifier.issn1615-5262
dc.identifier.issn1615-5270
dc.identifier.urihttp://hdl.handle.net/1721.1/121000
dc.description.abstractModern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authentication is an absolute necessity for ensuring security and reliable access to all type of transactions. However, more than 80% of the current authentication systems are password based, and surprisingly, they are prone to direct and indirect cracking via guessing or side channel attacks. The inspiration of Negative Authentication System (NAS) is based on the negative selection algorithm. In NAS, the password-based authentication data for valid users are termed as password profile or self-region (positive profile); any element other than the self-region is defined as non-self-region in the same representative space. The anti-password detectors are generated which covers most of the non-self-region. There are also some uncovered regions left in the non-self-region for inducing uncertainty to the attackers. In this work, we describe the design and implementation of three approaches of NAS and its efficacy over the other authentication methods. These three approaches represent three different ways to achieve obfuscation of password points with non-password space. The experiments are conducted with both real and simulated password profiles to justify the efficiency of different implementations of NAS. Keywords: Cyber-security, Levels of abstraction, Security event, Passwords, Authentication, Negative Authentication, Hashing, Saltingen_US
dc.publisherSpringer Berlin Heidelbergen_US
dc.relation.isversionofhttps://doi.org/10.1007/s10207-017-0395-8en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceSpringer Berlin Heidelbergen_US
dc.titleDesign and implementation of Negative Authentication Systemen_US
dc.typeArticleen_US
dc.identifier.citationDasgupta, Dipankar, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, Arunava Roy, Alvaro Madero, Abel Sanchez, and John R. Williams. “Design and Implementation of Negative Authentication System.” International Journal of Information Security 18, no. 1 (November 21, 2017): 23–48.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Civil and Environmental Engineeringen_US
dc.contributor.departmentMassachusetts Institute of Technology. Institute for Data, Systems, and Societyen_US
dc.contributor.mitauthorSanchez, Abel
dc.contributor.mitauthorMadero, Alvaro
dc.contributor.mitauthorWilliams, John R
dc.relation.journalInternational Journal of Information Securityen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2019-01-19T04:57:17Z
dc.language.rfc3066en
dc.rights.holderSpringer-Verlag GmbH Germany
dspace.orderedauthorsDasgupta, Dipankar; Nag, Abhijit Kumar; Ferebee, Denise; Saha, Sanjib Kumar; Subedi, Kul Prasad; Roy, Arunava; Madero, Alvaro; Sanchez, Abel; Williams, John R.en_US
dspace.embargo.termsNen
dc.identifier.orcidhttps://orcid.org/0000-0002-3826-2204
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record