(An) empirical analysis of credential breaches from vulnerable websites취약한 웹사이트를 대상으로 하는 자격 증명 침해에 대한 실증적 분석

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 46
  • Download : 0
Leaked credentials can yield severe problems if Internet users reuse their passwords in third-party services. In this circumstance, it is already prevalent that cybercriminals utilize leaked credentials to breach more critical information. To reduce the burdensome threats, several researches have centered around breached credentials, especially password reuse behaviors of users. However, there are still lack of large-scale analysis and diversity in credential sources. To address these limitations, we present a large-scale yet empirical analysis of the security risks in the breached victim websites and the security implications of their credentials using 361 million accounts breached from 22,379 websites. In our findings, we observe that 44% of the victim websites are still vulnerable to information leakage. As for the breached credentials, we figure out that 8.7 million national institute/corporate credentials are more likely to be targeted by cybercriminals. Additionally, we find that 86% of the users reuse the same passwords in multiple websites, which are noticeably higher than what the previous works measured due to the diversity of the victim websites in our dataset. We believe that our findings help researchers and practitioners obtain a deeper understanding of credential data breaches and remind Internet users of their security awareness.
Advisors
Shin, Seungwonresearcher신승원researcher
Description
한국과학기술원 :전기및전자공학부,
Publisher
한국과학기술원
Issue Date
2022
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2022.2,[iii, 35 p. :]

URI
http://hdl.handle.net/10203/309939
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=997184&flag=dissertation
Appears in Collection
EE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0