2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00071
|View full text |Cite
|
Sign up to set email alerts
|

On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness

Abstract: Modern trend sees a lot usage of honeywords (or fake password) for protecting the original passwords in the password file. However, the usage of honeywords has strongly been criticized under the different security and usability parameters. Though many of these issues have been successfully resolved, research in this domain is still facing difficulties in achieving flatness (or producing the equally probable honeywords with reference to the original password). Though recent studies have made a significant effor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…However, in reality, the probabilities of all the sweetwords are not necessarily equally flat. This brings us to the problem of flatness which measures how equally likely each of the sweetwords appears [4,10]. By using passive information or techniques like pattern recognition, some of the sweetwords can be eliminated, and the list can be narrowed down.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in reality, the probabilities of all the sweetwords are not necessarily equally flat. This brings us to the problem of flatness which measures how equally likely each of the sweetwords appears [4,10]. By using passive information or techniques like pattern recognition, some of the sweetwords can be eliminated, and the list can be narrowed down.…”
Section: Related Workmentioning
confidence: 99%
“…A lot of the works built on the foundation of the Honeywords project focus on qualitative advancement, which involves improving the mechanism of generating plausible passwords or achieving flatness. This is mostly done using either surveys [10] or using Deep Adversarial Neural Network-based models like PassGAN [11]. The number of honeywords can also be increased to achieve better security.…”
Section: Related Workmentioning
confidence: 99%
“…The Honeywords Generation Problem. Generating honeywords is a challenging problem mainly due to the various assumptions about the knowledge of the adversary as well as the passwordselection behaviour of human users [7,9,14,17,22]. The success of HGTs lies on the quality of the resulting honeywords; the method fails if an adversary can easily distinguish the real password from the honeywords [22].…”
Section: Preliminariesmentioning
confidence: 99%
“…The most challenging part for the system administrator to implement the honeywords system is how to create the decoy passwords that fulfill the security and usability standards of the system [9], [10]. Unfortunately, usability and security often collide with each other so that the two standards cannot be met [9]. Based on whether there is a modification on the user interface (UI) for password change, the honeywords generation methods can be divided into two classes: the legacy-UI and the modified-UI approach.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, some modified-UI based methods (e.g. take-a-tail in [7]) sometime become unusable in practice [9]. Therefore, legacy-UI is more recommended due to its high usability.…”
Section: Introductionmentioning
confidence: 99%