2019
DOI: 10.14569/ijacsa.2019.0100305
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours

Abstract: Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases. For each user account, the original password is stored with many honeywords in order to thwart any adversary. The honeywords are selected deliberately such that a cyber-attacker who steals a file of hashed passwords cannot be sure, if it is the real password or a honeyword for any account. Moreover, entering with a honeyword to login will trigger an alarm notifying the administrator about a password file breach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“… Population size (population of salps) n: The proposed SSA experimented with many population sizes (20,40,60,80), with the size (80) being chosen as the generation size because the number of individuals suited the algorithm procedures. -We hereby confirm that all the Algorithms and Tables in the manuscript are ours.…”
Section: Parametersmentioning
confidence: 99%
“… Population size (population of salps) n: The proposed SSA experimented with many population sizes (20,40,60,80), with the size (80) being chosen as the generation size because the number of individuals suited the algorithm procedures. -We hereby confirm that all the Algorithms and Tables in the manuscript are ours.…”
Section: Parametersmentioning
confidence: 99%
“…A k i f et al [50] suggested an alternative method that generates honeywords by using four techniques. As a consequence, four sets of honeywords are introduced to the system that seems like actual passwords.…”
Section: In 2019mentioning
confidence: 99%
“…For example, AAAAA ABCDD Remark 32. Choosing a tail issue On: Dictionary attack method [50], this method does not always generate honeywords because some passwords cannot be found in a dictionary attack.…”
Section: Remark 28 Storing and Sending Image Issuementioning
confidence: 99%
“…H (password|r) will be saved in the system's password file. (v) In [19], Akif et al suggest a new honeyword generation approach that includes all four ways. As a consequence, the system received four groups of honeywords that are generated from the following: (1) Existing user information: Creating data with two sections of public personal questions.…”
Section: Related Workmentioning
confidence: 99%