Secure Application Access from the Standpoint of Password Strength

Author(s):  
Petr Doucek ◽  
Luboš Pavlíček ◽  
Lea Nedomová ◽  
Jiří Sedláček
2018 ◽  
Vol 3 (1) ◽  
pp. 55
Author(s):  
Griffani Megiyanto Rahmatullah ◽  
Muhammad Ayat ◽  
Wirmanto Suteddy

Sistem keamanan rumah merupakan implementasi yang harus dilakukan untuk meningkatkan keamanan dari kejadian yang tidak diinginkan. Beberapa implementasi hanya memberikan notifikasi sederhana berupa alarm dan tidak menjadi bukti yang kuat apabila terjadi pencurian. Salah satu solusi yang dilakukan adalah penempatan kamera untuk memantau keamanan rumah secara real time diintegrasikan dengan penyimpanan cloud. Bluemix merupakan salah satu provider untuk aplikasi cloud yang memiliki layanan pengolahan dan penyimpanan data, akses aplikasi mobile, pengawasan serta Internet of Things (IoT). Sistem yang diimplementasikan adalah integrasi Raspberry Pi dengan layanan Bluemix untuk melakukan pengawasan keamanan rumah dan memberikan notifikasi kepada pengguna. Sistem mendeteksi jarak menggunakan sensor HC-SR04 terhadap objek dan apabila jarak melewati acuan, hal tersebut adalah indikasi terjadinya pencurian. Berikutnya sistem akan menyalakan buzzer sebagai keluaran suara dan mengaktifkan kamera untuk mengambil gambar lalu diunggah ke object storage Bluemix. Langkah berikutnya yaitu layanan IBM push notification memberikan notifikasi ke perangkat Android pengguna. Pengujian dilakukan dengan menghalangi pembacaan sensor sehingga terjadi indikasi pencurian. Hasilnya adalah sistem berhasil menyalakan buzzer, mengambil gambar lalu diunggah ke Bluemix, dan notifikasi berhasil masuk pada Android. Notifikasi diterima oleh file browser pada perangkat Android dan dilakukan sinkronisasi dengan object storage untuk melakukan pengunduhan berkas gambar yang telah diunggah sebelumnya.Kata kunci: Bluemix, Raspberry Pi, object sorage, IBM push notification Home security system is an implementation that needs to be done to improve the security of unwanted events. Some implementations only provide a simple notification such as alarm and cannot become strong evidence in case of theft. One of the solutions is camera placement to monitor home security in real time integrated with cloud storage. Bluemix is a provider for cloud applications that have data processing and storage services, mobile application access, monitoring and Internet of Things (IoT). System implemented was integration of Raspberry Pi with Bluemix services to conduct home security surveillance and provide notification to user. System detected distance using HC-SR04 sensor to object and if distance passes the reference, it was an indication of theft. Next, system will turned on buzzer as a sound output and activating the camera to take picture and uploaded to Bluemix Object Storage. Next step was IBM push notification service giving notification to user's Android device. The testing was done by blocking the sensor readings so that there was an indication of theft. The result was system succeeded in turning on the buzzer, taking pictures, uploading pictures to Bluemix, and notification successfully logged on Android. Notifications are received by the file browser on Android device and synchronized with object storage to download image files that have been uploaded previously.Keywords: Bluemix, Raspberry Pi, object storage, IBM push notification 


Author(s):  
Monte Hancock ◽  
Federico Calderon ◽  
Mendi Drayton ◽  
Edward Stapleton ◽  
John Nida ◽  
...  

Synthesis ◽  
2021 ◽  
Author(s):  
Christian V. Stevens ◽  
Jonas Everaert ◽  
Maarten Debruyne ◽  
Flore Vanden Bussche ◽  
Kristof Van Hecke ◽  
...  

AbstractCovalent triazine frameworks (CTFs) based on polydentate ligands are highly promising supports to anchor catalytic metal complexes. The modular nature of CTFs allows to tailor the composition, structure, and function to its specific application. Access to a broad range of chelating building blocks is therefore essential. In this respect, we extended the current available set of CTF building blocks with new nitrile-functionalized N-heterocyclic ligands. This paper presents the synthesis of the six ligands which vary in the extent of the aromatic system and the denticity. The new building blocks may help in a rational design of enhanced support materials in catalysis.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3106 ◽  
Author(s):  
Sungyup Nam ◽  
Seungho Jeon ◽  
Hongkyo Kim ◽  
Jongsub Moon

Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users’ memory. This reliance on memory is a weakness of passwords, and people therefore usually use easy-to-remember passwords, such as “iloveyou1234”. However, these sample passwords are not difficult to crack. The default passwords of IoT also are text-based passwords and are easy to crack. This weakness enables free password cracking tools such as Hashcat and JtR to execute millions of cracking attempts per second. Finally, this weakness creates a security hole in networks by giving hackers access to an IoT device easily. Research has been conducted to better exploit weak passwords to improve password-cracking performance. The Markov model and probabilistic context-free-grammar (PCFG) are representative research results, and PassGAN, which uses generative adversarial networks (GANs), was recently introduced. These advanced password cracking techniques contribute to the development of better password strength checkers. We studied some methods of improving the performance of PassGAN, and developed two approaches for better password cracking: the first was changing the convolutional neural network (CNN)-based improved Wasserstein GAN (IWGAN) cost function to an RNN-based cost function; the second was employing the dual-discriminator GAN structure. In the password cracking performance experiments, our models showed 10–15% better performance than PassGAN. Through additional performance experiments with PCFG, we identified the cracking performance advantages of PassGAN and our models over PCFG. Finally, we prove that our models enhanced password strength estimation through a comparison with zxcvbn.


Sign in / Sign up

Export Citation Format

Share Document