Mitigating Online Password Attacks: A Comprehensive Review of Password Models

  • Kirushnaamoni Ramakrishnan
Keywords: Online password attacks, Brute force attacks, Dictionary attacks, Cross-site attacks, authentication systems, password-based systems, alphanumeric passwords

Abstract

Most authentication systems rely on alphanumeric passwords as a first line of defense. This review outlines various online password attacks and evaluates models proposed to mitigate them. A secondary aim is to explore ways to improve password selection and memorability without user inconvenience. Nine articles from 2019 to 2023 were reviewed, focusing on password checkers, entropy values, and password structures to ensure system security against online attacks, while analyzing usability and security aspects of the models. Most of these models were implemented in controlled environments rather than in real-time scenarios. Future work includes surveying user preferences for password and authentication systems.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Barkadehi, M. H., Nilashi, M., Ibrahim, O., Zakeri Fardi, A., & Samad, S. (2018). Authentication systems: A literature review and classification. Telematics and Informatics, 35(5),1491–1511. https://doi.org/10.1016/j.tele.2018.03.018

‌Kirushnaamoni, R. (2013, February). Defenses to curb online password guessing attacks. In 2013 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 317-322). IEEE.

Moher, D. (2019). Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. Annals of Internal Medicine, 151(4), 264. https://www.acpjournals.org/doi/abs/10.7326/0003-4819-151-4-200908180-00135.

Wang, X., Yan, Z., Zhang, R., & Zhang, P. (2021). Attacks and defenses in user authentication systems: A survey. Journal of Network and Computer Applications, 188(1), 103080. https://doi.org/10.1016/j.jnca.2021.103080.

Published
2025-01-07
How to Cite
Ramakrishnan, K. (2025). Mitigating Online Password Attacks: A Comprehensive Review of Password Models. Rangahau Aranga: AUT Graduate Review, 3(1). https://doi.org/10.24135/rangahau-aranga.v3i2.234
Section
Research Methodologies Issue