User’s Intellectual and Emotional Quality based Password Guessing. Kumar, R., Sharma, I., Chatterjee, T., , & Bhattacharya, M. 2014.
Paper abstract bibtex Password cracking, which is an important research field in this technologically advanced world, is a quite sophisticated field and when done for personal benefit is a crime and in this research paper, password is guessed on the basis of user’s identity, emotional and intellectual qualities. T he user’s data along with his/her behavior performed on the internet is collected by using web crawler. A popular known dataset called UDI - Twitter Crawl 2012 Datase t has been used to make the testing process easy by revealing the true nature and identity of person. It contains more than 1500 tweets of a single user, his/ he r following and current city. A database is constructed which is categorized on the basis of pri ority using part of speech tagging and some known data structure mentioned in this paper. In this categorized data some more keywords are added related to the data in same order as listed priority by using Google AdWords Keyword tool. U sing permute algorit hm , all possible password combinations are made to crack passwords which are weak in nature. This experiment result is then tested against the most popular tool result known as John the Ripper tool. This unique method has learning capability which learns f rom previous mistakes and also reads user behavior in detecting password.
@conference{kumar2014users,
abstract = {Password cracking, which is an important research field in this technologically
advanced world, is a quite sophisticated field and when done for personal benefit is a crime
and in this research paper,
password is guessed on the basis of user’s identity, emotional
and intellectual qualities. T
he user’s data
along with his/her behavior performed on the
internet is collected
by using web crawler.
A
popular known dataset
called
UDI
-
Twitter
Crawl 2012 Datase
t
has been used to make the testing process easy by revealing
the true
nature and identity of person. It contains more than 1500
tweets of a single user, his/
he
r
following and current city. A database is constructed
which is categorized on the basis of
pri
ority using part of speech tagging and some known data structure mentioned in this
paper. In this categorized data some more keywords
are added related to the
data in same
order as listed priority by using
Google AdWords Keyword tool. U
sing permute algorit
hm
,
all
possible password combinations are made
to crack passwords which are weak in nature.
This experiment result is then tested against the most popular tool result known as John the
Ripper tool. This unique
method has learning capability which learns f
rom previous mistakes and also reads user behavior in detecting password.},
added-at = {2014-03-24T05:40:30.000+0100},
author = {Kumar, Ravi and Sharma, Ishani and Chatterjee, Tanmay and and Mahua Bhattacharya},
biburl = {https://www.bibsonomy.org/bibtex/250891ab2ad3b9a629780aeac4a000c14/idescitation},
interhash = {a71499597221565f98b11a51f5c72ac3},
intrahash = {50891ab2ad3b9a629780aeac4a000c14},
keywords = {the TwitterCrawl UDI 2012 John Ripper},
organization = {Institute of Doctors Engineers and Scientists},
publisher = {ACEEE (A Computer division of IDES)},
timestamp = {2014-03-24T05:40:30.000+0100},
title = {User’s Intellectual and Emotional Quality based
Password Guessing},
url = {http://searchdl.org/public/conference/2014/ITC/90.pdf},
year = 2014
}
Downloads: 0
{"_id":"yQErKNvvsgizvA58W","bibbaseid":"kumar-sharma-chatterjee--bhattacharya-usersintellectualandemotionalqualitybasedpasswordguessing-2014","author_short":["Kumar, R.","Sharma, I.","Chatterjee, T.","","Bhattacharya, M."],"bibdata":{"bibtype":"conference","type":"conference","abstract":"Password cracking, which is an important research field in this technologically advanced world, is a quite sophisticated field and when done for personal benefit is a crime and in this research paper, password is guessed on the basis of user’s identity, emotional and intellectual qualities. T he user’s data along with his/her behavior performed on the internet is collected by using web crawler. A popular known dataset called UDI - Twitter Crawl 2012 Datase t has been used to make the testing process easy by revealing the true nature and identity of person. It contains more than 1500 tweets of a single user, his/ he r following and current city. A database is constructed which is categorized on the basis of pri ority using part of speech tagging and some known data structure mentioned in this paper. In this categorized data some more keywords are added related to the data in same order as listed priority by using Google AdWords Keyword tool. U sing permute algorit hm , all possible password combinations are made to crack passwords which are weak in nature. This experiment result is then tested against the most popular tool result known as John the Ripper tool. This unique method has learning capability which learns f rom previous mistakes and also reads user behavior in detecting password.","added-at":"2014-03-24T05:40:30.000+0100","author":[{"propositions":[],"lastnames":["Kumar"],"firstnames":["Ravi"],"suffixes":[]},{"propositions":[],"lastnames":["Sharma"],"firstnames":["Ishani"],"suffixes":[]},{"propositions":[],"lastnames":["Chatterjee"],"firstnames":["Tanmay"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":[""],"suffixes":[]},{"firstnames":["Mahua"],"propositions":[],"lastnames":["Bhattacharya"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/250891ab2ad3b9a629780aeac4a000c14/idescitation","interhash":"a71499597221565f98b11a51f5c72ac3","intrahash":"50891ab2ad3b9a629780aeac4a000c14","keywords":"the TwitterCrawl UDI 2012 John Ripper","organization":"Institute of Doctors Engineers and Scientists","publisher":"ACEEE (A Computer division of IDES)","timestamp":"2014-03-24T05:40:30.000+0100","title":"User’s Intellectual and Emotional Quality based Password Guessing","url":"http://searchdl.org/public/conference/2014/ITC/90.pdf","year":"2014","bibtex":"@conference{kumar2014users,\n abstract = {Password cracking, which is an important research field in this technologically\r\nadvanced world, is a quite sophisticated field and when done for personal benefit is a crime\r\nand in this research paper,\r\npassword is guessed on the basis of user’s identity, emotional\r\nand intellectual qualities. T\r\nhe user’s data\r\nalong with his/her behavior performed on the\r\ninternet is collected\r\nby using web crawler.\r\nA\r\npopular known dataset\r\ncalled\r\nUDI\r\n-\r\nTwitter\r\nCrawl 2012 Datase\r\nt\r\nhas been used to make the testing process easy by revealing\r\nthe true\r\nnature and identity of person. It contains more than 1500\r\ntweets of a single user, his/\r\nhe\r\nr\r\nfollowing and current city. A database is constructed\r\nwhich is categorized on the basis of\r\npri\r\nority using part of speech tagging and some known data structure mentioned in this\r\npaper. In this categorized data some more keywords\r\nare added related to the\r\ndata in same\r\norder as listed priority by using\r\nGoogle AdWords Keyword tool. U\r\nsing permute algorit\r\nhm\r\n,\r\nall\r\npossible password combinations are made\r\nto crack passwords which are weak in nature.\r\nThis experiment result is then tested against the most popular tool result known as John the\r\nRipper tool. This unique\r\nmethod has learning capability which learns f\r\nrom previous mistakes and also reads user behavior in detecting password.},\n added-at = {2014-03-24T05:40:30.000+0100},\n author = {Kumar, Ravi and Sharma, Ishani and Chatterjee, Tanmay and and Mahua Bhattacharya},\n biburl = {https://www.bibsonomy.org/bibtex/250891ab2ad3b9a629780aeac4a000c14/idescitation},\n interhash = {a71499597221565f98b11a51f5c72ac3},\n intrahash = {50891ab2ad3b9a629780aeac4a000c14},\n keywords = {the TwitterCrawl UDI 2012 John Ripper},\n organization = {Institute of Doctors Engineers and Scientists},\n publisher = {ACEEE (A Computer division of IDES)},\n timestamp = {2014-03-24T05:40:30.000+0100},\n title = {User’s Intellectual and Emotional Quality based\r\nPassword Guessing},\n url = {http://searchdl.org/public/conference/2014/ITC/90.pdf},\n year = 2014\n}\n\n","author_short":["Kumar, R.","Sharma, I.","Chatterjee, T.","","Bhattacharya, M."],"key":"kumar2014users","id":"kumar2014users","bibbaseid":"kumar-sharma-chatterjee--bhattacharya-usersintellectualandemotionalqualitybasedpasswordguessing-2014","role":"author","urls":{"Paper":"http://searchdl.org/public/conference/2014/ITC/90.pdf"},"keyword":["the TwitterCrawl UDI 2012 John Ripper"],"metadata":{"authorlinks":{}}},"bibtype":"conference","biburl":"http://www.bibsonomy.org/bib/author/ravi Kumar?items=1000","dataSources":["DiSHMj5oiLBLaqrYP"],"keywords":["the twittercrawl udi 2012 john ripper"],"search_terms":["user","intellectual","emotional","quality","based","password","guessing","kumar","sharma","chatterjee","","bhattacharya"],"title":"User’s Intellectual and Emotional Quality based Password Guessing","year":2014}