Search
Close this search box.

Authors: Adesina S. Sodiya; A.A. Afolorunso; Omoniyi P. Ogunderu
International Journal of Information and Computer Security (IJICS), Vol. 4, No. 4, 2011

Abstract
Password authentication systems, which are used as first level of defence, are not efficient enough to withstand the dynamic techniques of attackers. In this work, an authentication scheme using first trial

protocol (FTR protocol) was developed to prevent dictionary and brute force attacks. FTR protocol uses a rule-based reasoning and splits the process of authentication into two layers; first and second layer protocols. The first layer undertakes the validation of the login password against set of recorded invalid passwords in the first layer repository. The second layer is the second line of authentication in another host different from that of first layer containing the protocol and its penalties. 11,000,000 human authentication request data were used to conduct an evaluation experiment. Zero vulnerability was found in the protocol and an efficient value of 97.89% was established as a confidence measure. This shows that the protocol is secured against online password guessing attacks.

Download PDF

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds