Abstract
In this paper we propose a new proactive password checker, a program which prevents the choice of easy-to-guess passwords. The checker uses a decision tree which has been set up applying the Minimum Description LengthPrinciple and a Pessimistic Pruning Technique to refine its predictive power. Experimental results show a substantial improvement in performances of this checker with respect to previous proposals. Moreover, the system is user-friendly and can be adapted to a per-site policy by the system administrator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Anderson. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P. Anderson Co. April 1980.
F. Bergadano, B. Crispo and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Transactions on Information and System Security. Vol. 1, No. 1, November 1998, Pages 3–25.
M. Bishop. Anatomy of a Proactive Password Checker. Proceedings of the Third UNIX Security Symposium, pp. 130–139, September 1992.
M. Bishop. Proactive Password Checking. Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11: 1–9 (Aug. 1992).
M. Bishop. Improving System Security via Proactive Password Checking. Computers and Security, 14(3) pp. 233–249 (1995)
M. Bishop. Password Management. Proceedings of COMPCON 1991, pp. 167–169 (Feb. 1991).
B. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors. Communications of ACM, July 1970.
V. Boyko, P. MacKenzie, S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Proceedings of Eurocrypt 2000, LNCS vol. 1807, pp. 156–171.
Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Wadsworth & Brooks/Cole, 1984 Advanced Books & Software. Pacific Grove, CA.
C. Davies and R. Ganesan. Bapasswd: A new proactive password checker. Proceedings of the 16th National Conference on Computer Security. Baltimore, MD, Sept. 20–23.
J. Katz, R. Ostrovsky, M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Proceedings of Eurocrypt 2001 LNCS vol. 2045, pp. 475–495.
D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proceedings of the Fifth Data Communications Symposium. September 1977.
A. Muffett. Crack 5.0. USENET News.
J. B. Nagle. An Obvious Password Detector. USENET News 16, 60.
B. C. Neuman and T. Tso. Kerberos: an authentication service for computer networks. IEEE Trans. Commun., 32. 33–38, 1994.
J. R. Quinlan. Simplifying decision Trees, Int. J. of Man Machine Studies, 27 Academic Press Limited, London, 1987
J. R. Quinlan. C4.5: Program for Machine Learning, Morgan Kaufmann Publishers Inc., San Francisco, CA
J. Rissanen, Stochastic complexity and modeling, Ann. Stat. 14.3, 1080–1100.
E. Spafford. OPUS: Preventing Weak Password Choices. Computers and Security, No. 3, 1992
R. Stalling. Network and Internetwork Security. Prentice Hall, Englewood Cliffs, New Jersey
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blundo, C., D’Arco, P., De Santis, A., Galdi, C. (2001). Hyppocrates A New Proactive Password Checker. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_5
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive