Discouraging Penetration Attempts on Interactive Computer Systems Without Denial of Service
Original Publication Date: 1989-Feb-01
Included in the Prior Art Database: 2005-Jan-27
A technique is described whereby the implementation of an algorithm discourages multiple attempts to penetrate computer access by an intruder, but continues to provide service to legitimate users. Typically, interactive computing systems require users to enter an identification (userid) and a password to demonstrate identity during the logging-in process. However, many systems do not have a mechanism to prevent unauthorized users from repetitively entering combinations of userid and passwords. The unauthorized user can try combinations repeatedly until a valid hit is made for gaining access. Frequently, means of dealing with this security exposure have utilized a counting means to record the unsuccessful log-in attempts associated with the terminal (port) or with the userid.