Skip to main content

2015 | OriginalPaper | Buchkapitel

Gathering and Analyzing Identity Leaks for Security Awareness

verfasst von : David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, Christoph Meinel

Erschienen in: Technology and Practice of Passwords

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The amount of identity data leaks in recent times is drastically increasing. Not only smaller web services, but also established technology companies are affected. However, it is not commonly known, that incidents covered by media are just the tip of the iceberg. Accordingly, more detailed investigation of not just publicly accessible parts of the web but also deep web is imperative to gain greater insight into the large number of data leaks. This paper presents methods and experiences of our deep web analysis. We give insight in commonly used platforms for data exposure, formats of identity related data leaks, and the methods of our analysis. On one hand a lack of security implementations among Internet service providers exists and on the other hand users still tend to generate and reuse weak passwords. By publishing our results we aim to increase awareness on both sides and the establishment of counter measures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Symantec Corporation. Internet Security Threat Report (2014) Symantec Corporation. Internet Security Threat Report (2014)
3.
Zurück zum Zitat Data Breach QuickView: An Executive’s Guide to 2013 Data Breach Trends. Presentation, Risk Based Security, February 2014 Data Breach QuickView: An Executive’s Guide to 2013 Data Breach Trends. Presentation, Risk Based Security, February 2014
5.
Zurück zum Zitat Mirante, D., Cappos, J.: Understanding Password Database Compromises. Technical report TR-CSE-2013-02, Department of Computer Science and Engineering Polytechnic Institute of NYU (2013) Mirante, D., Cappos, J.: Understanding Password Database Compromises. Technical report TR-CSE-2013-02, Department of Computer Science and Engineering Polytechnic Institute of NYU (2013)
7.
Zurück zum Zitat Castelluccia, C., Chaabane, A., et al.: When privacy meets security: leveraging personal information for password cracking. In: ArXiv e-prints, April 2013 Castelluccia, C., Chaabane, A., et al.: When privacy meets security: leveraging personal information for password cracking. In: ArXiv e-prints, April 2013
10.
Zurück zum Zitat Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1–18. Springer, Heidelberg (2009) CrossRef Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1–18. Springer, Heidelberg (2009) CrossRef
12.
Zurück zum Zitat Nadji, Y., Antonakakis, M. et al.: Beheading hydras: performing effective botnet takedowns. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 121–132. ACM, New York (2013) Nadji, Y., Antonakakis, M. et al.: Beheading hydras: performing effective botnet takedowns. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 121–132. ACM, New York (2013)
13.
Zurück zum Zitat Stone-Gross, B., Cova, M. et al.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS 2009, pp. 635–647. ACM, New York (2009) Stone-Gross, B., Cova, M. et al.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS 2009, pp. 635–647. ACM, New York (2009)
14.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004 Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004
16.
Zurück zum Zitat Bonneau, J., Xu, R.: Character encoding issues for web passwords. In: Web 2.0 Security & Privacy 2012 (W2SP) (2012) Bonneau, J., Xu, R.: Character encoding issues for web passwords. In: Web 2.0 Security & Privacy 2012 (W2SP) (2012)
17.
Zurück zum Zitat Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005) CrossRef Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005) CrossRef
18.
Zurück zum Zitat Hillerup, J.C.: Cryptanalysis and its Applications to Password Hashing. MA thesis. KTH Information and Communication Technology (2013) Hillerup, J.C.: Cryptanalysis and its Applications to Password Hashing. MA thesis. KTH Information and Communication Technology (2013)
19.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (2005) Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (2005)
20.
Zurück zum Zitat Teat, C., Peltsverger, S.: The security of cryptographic hashes. In: Proceedings of the 49th Annual Southeast Regional Conference, March 2011 Teat, C., Peltsverger, S.: The security of cryptographic hashes. In: Proceedings of the 49th Annual Southeast Regional Conference, March 2011
Metadaten
Titel
Gathering and Analyzing Identity Leaks for Security Awareness
verfasst von
David Jaeger
Hendrik Graupner
Andrey Sapegin
Feng Cheng
Christoph Meinel
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-24192-0_7