Mitigating Online Password Attacks: A Comprehensive Review of Password Models
Abstract
Most authentication systems rely on alphanumeric passwords as a first line of defense. This review outlines various online password attacks and evaluates models proposed to mitigate them. A secondary aim is to explore ways to improve password selection and memorability without user inconvenience. Nine articles from 2019 to 2023 were reviewed, focusing on password checkers, entropy values, and password structures to ensure system security against online attacks, while analyzing usability and security aspects of the models. Most of these models were implemented in controlled environments rather than in real-time scenarios. Future work includes surveying user preferences for password and authentication systems.
Downloads
Metrics
References
Barkadehi, M. H., Nilashi, M., Ibrahim, O., Zakeri Fardi, A., & Samad, S. (2018). Authentication systems: A literature review and classification. Telematics and Informatics, 35(5),1491–1511. https://doi.org/10.1016/j.tele.2018.03.018
Kirushnaamoni, R. (2013, February). Defenses to curb online password guessing attacks. In 2013 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 317-322). IEEE.
Moher, D. (2019). Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. Annals of Internal Medicine, 151(4), 264. https://www.acpjournals.org/doi/abs/10.7326/0003-4819-151-4-200908180-00135.
Wang, X., Yan, Z., Zhang, R., & Zhang, P. (2021). Attacks and defenses in user authentication systems: A survey. Journal of Network and Computer Applications, 188(1), 103080. https://doi.org/10.1016/j.jnca.2021.103080.
Copyright (c) 2025 Kirushnaamoni Ramakrishnan
Article text:
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Photos:
The images in Rangahau Aranga are not covered by the Creative Commons license and are subject to copyright. Permission to reproduce this material must be sought from the copyright holder concerned.