A Survey on Brute Force Attack on Open Functionality Secured

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer’s face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. In the world of Cyber crimes, brute force attack is an activity which involves repetitive successive attempts of trying various password combinations to break into any website. This attempt is carried out vigorously by the hackers who also make use of bots they have installed maliciously in other computers to boost the computing power required to run such type of attacks. Usually, every common ID (for e.g. “admin”) has a password. All you need to do is try to guess the password. Let’s say if it’s a 2-digit-pin, you have 10 numeric digits from 0 to 9. This means there are 100 possibilities. You can figure this out with pen and paper like Mr. Bean who tried to find correct last two digits of the phone number of the lost kid’s father in the movie, Mr. Bean’s Holiday. But, the truth is that no password in the world consists of only 2 characters. Even, the pin numbers (a sort of password) used on mobile phones or in a bank consist of minimum 4 characters.And, on the internet, 8 is generally the standard number for shortest length of a password. Furthermore, complexity is added as alphabets are added within a password to make it more secure. By the way, alphabets can be used in both UPPER and lower cases, thus making a password case sensitive. Behind brute force attack, hacker’s motive is to gain illegal access to a targeted website and utilize it in either executing another kind of attack or stealing valuable data or simply shut it down. It is also possible that the attacker infect the targeted site with malicious scripts for long term objectives without even touching a single thing and leaving no trace behind.

Authors and Affiliations

Sony Jacob M. Phil Scholar, Mr. B Senthil Kumar Msc Mphil

Keywords

.

Related Articles

 Electricity, Computers, Innovation, Environment and Capacity Building: A Statistical Review

 Abstract : The objective was to examine the frameworks needed to foster innovations and to mobilize innovation towards co - creating computers in the context of developing countries’ challenge of unreliable energ...

A Critical Conceptual Analysis of Definitions of Artificial Intelligence as Applicable to Computer Engineering

The purpose of artificial intelligence is to acquire knowledge of required subject. Knowledge acquisition involves knowledge of dark energy (74% of universe), knowledge of dark matter (22%) and knowledge of visible matte...

A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data

Abstract: Cloud Computing is an emerging technology now days in this connection in order to store and share huge volume of data over internet we required Cloud Services like IaaS (Infrastructure as a Service) where it ca...

New Technique For Preventing SQL Injection Attack Based On Normal Use Model

Online applications have turned into an essential piece of our day by day lives, yet in the meantime, security of digital data put away in the web databases has been a developing concern. SQL injection attacks have been...

 A Hierarchical Clustering Algorithm Based Computer Aided  Molecular Modeling with Haematoxylin & Eosin Images of Colon Cancer

 Color Image segmentation plays a crucial role in many medical imaging applications. In this paper we present a novel algorithm for computer aided molecular modeling in MATLAB R2012, a real time simulation  e...

Download PDF file
  • EP ID EP406755
  • DOI 10.9790/0661-2005040106.
  • Views 95
  • Downloads 0

How To Cite

Sony Jacob M. Phil Scholar, Mr. B Senthil Kumar Msc Mphil (2018). A Survey on Brute Force Attack on Open Functionality Secured. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 1-6. https://europub.co.uk./articles/-A-406755