Also found in: Wikipedia.
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
Step 2: The user browser submits the username and passwd to the web server.
Normal and attack traffic information for KDD99 dataset DoS Probe Total Total Dataset instances Attacks instances Attacks 10% KDD 391458 apache2 4107 satan, smurf, ipsweep, Corrected 229853 neptune, 4107 portsweep, KDD back, nmap, mscan, teardrop, saint Whole KDD 229853 pod, land, 4107 mailbomb, syn flood, ping of death, syslogd, process table udpstorm u2r Total Dataset instances Attacks 10% KDD 52 buffer overflow, Corrected 52 rootkit, KDD loadmodule, perl, ps, Whole KDD 52 xterm, eject, ffbconfig, fdformat r2l Total Dataset instances Attacks Normal 10% KDD 1126 warezclient, 97277 guess passwd, Corrected 1126 warezmaster, 97277 KDD imap, ftp write, Whole KDD 1126 multihop, 97277 phf, spy, named, sendmail, xlock, xsnoop Table VIII.
Suppose that the client C has performed a trace {login!, passwd!}: Then, the initialisation trace for the server B would be {connect?, pwd?}.
extName and passwd contain usernames and passwords used to log into web databases that require user authentication, wid and uid is a foreign key column containing web database and local user indentifiers, respectively.
SERVER(S,kab) knows PK, SSK(S), SKey, passwd INITIATOR(A, S, na) =
In the protocol there are three different keys SessionKey which is defined as kab, ServerKey as SKey and Password as passwd. kab, passwd are assigned to a non-positive rank, because they are supposed to be private to agents in the protocol.
These messages are messages of steps 3, 5 and 6 at protocol description, which are generated by passwd, kab.