Dictionary Based Brute Force Attack – Study Case of Montenegro and China

Milena Djukanovic*, Lazar Novicevic, Liehuang Zhu, Peng Jiang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

One of the most common cyber-attacks is brute force attack which puts users at a high security risk. This paper deals with statistical analysis and comparison of passwords’ strength between two countries - Montenegro and PR of China through the help of extensive digital survey. In-depth analysis has helped us conclude what is the role of culture and computer literacy while creating stronger passwords and improving cyber security. Also, the results show the passwords’ differences that help the creation of a perfect dictionary that can be used as a starting point for programming a brute force attack. One more purpose of this research is to help employees in law enforcement dealing with digital forensics, to find digital evidence in cyber incidents in the shortest amount of time.

Original languageEnglish
Title of host publicationNew Technologies, Development and Application IV
EditorsIsak Karabegović
PublisherSpringer Science and Business Media Deutschland GmbH
Pages647-652
Number of pages6
ISBN (Print)9783030752743
DOIs
Publication statusPublished - 2021
EventInternational Conference on New Technologies, Development and Application, NT 2021 - Sarajevo, Bosnia and Herzegovina
Duration: 24 Jun 202126 Jun 2021

Publication series

NameLecture Notes in Networks and Systems
Volume233
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceInternational Conference on New Technologies, Development and Application, NT 2021
Country/TerritoryBosnia and Herzegovina
CitySarajevo
Period24/06/2126/06/21

Keywords

  • Cyber security
  • Data comparison
  • Dictionary based brute force attack
  • Password strength

Fingerprint

Dive into the research topics of 'Dictionary Based Brute Force Attack – Study Case of Montenegro and China'. Together they form a unique fingerprint.

Cite this