Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Research Article

All Your Accounts Are Belong to Us

Download
1608 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-78813-5_13,
        author={Vlad Bulakh and Andrew Kaizer and Minaxi Gupta},
        title={All Your Accounts Are Belong to Us},
        proceedings={Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings},
        proceedings_a={SECURECOMM},
        year={2018},
        month={4},
        keywords={Data breach Underground forum Credential stuffing Account cracking Credential verification Cracking tools Sentry MBA Account Hitman AIOHNB Vertex Classifier Supervised machine learning Random Forest},
        doi={10.1007/978-3-319-78813-5_13}
    }
    
  • Vlad Bulakh
    Andrew Kaizer
    Minaxi Gupta
    Year: 2018
    All Your Accounts Are Belong to Us
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-78813-5_13
Vlad Bulakh1,*, Andrew Kaizer1,*, Minaxi Gupta2,*
  • 1: Indiana University
  • 2: Edmodo Inc.
*Contact email: vbulakh@indiana.edu, akaizer@indiana.edu, minaxi@edmodo.com

Abstract

Over the last several years, there have been a number of high profile and well-publicized data breaches. These breaches led to the theft of personal, financial, and health information from users who are often only notified of such breaches well after they occur and the damage has already been done. Cyber criminals use account cracking tools, which are software programs that help miscreants gain access to users’ online accounts, to perform credential stuffing attacks against the credentials exposed by these breaches.