Abstract

Honeywords are the decoy words also known as potential password for a user which, when an attacker enters in the system, it is detected by the honeychecker. Honeyword is a technique that can be successfully used as a guard strategy which can be utilized against stolen secret key records. This technique is honed by putting bogus patterns of passwords inside the record that consist of passwords of authentication server to deceive adversary. Honeywords resemble ordinary, user-selected passwords. Various different password patterns make it troublesome for the attacker that steal a honeyword-laced password file to recognize the true user password and honeyword. (?Honey? is an old term for decoy resources in computing environments). In existing system honeywords (decoy passwords) are used to detect malicious attempter against hashed password database. While considering every single accessible record, the legitimate passwords are stored along with various patterns and different combinations of honeywords in order sense impersonation. While considering runtime scenario, a cyber-attacker hacked the file consisting of hashed passwords, but the attacker cannot make out whether the password that is available is authentic password or the honeyword any specific account. If the attacker tries to enter the dummy (honeyword) credentials, then an alarm will be triggered and that will notify the administrator regarding password file breach. Considering the present scenario of the expenses on the storage requirement for expanding the capacity prerequisite by ample amount, this technique is easy to adopt and implement efficiently to encounter the issues of password file disclosure events. The aim of this research is to study honeyword generation system and techniques and compare the sub tasks using the literatures published in those areas finding out the research gaps in them and to analyses them to make password more secure using security hybrid generation method using triple hashing technique as perfectly flat honeyword gene ration method. The second aim is to make honeywords more realistic to trap adversary easily.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.