Honeywords Generation Method for Passwords based on User Behaviours |
Author(s): |
| K. Vinitha , NGM College, pollachi; Dr. R. Manicka Chezian, NGM College, Pollachi |
Keywords: |
| Cyber-Attacker, Detection Password, Generic Password, Shuffling Characters, Real Password |
Abstract |
|
The Honeywords are selected deliberately, such that a cyber-attacker who steals a file of hashed passwords cannot be sure, if it is the real password or a Honeywords for any account. Moreover, entering with a Honeywords to login will trigger an alarm notifying the administrator about a password file breach. At the expense of increasing the storage requirement by 24 times, the authors introduce a simple and effective solution to the detection of password file disclosure events. In this study, it scrutinizes the Honeywords system and highlight possible weak points. Also, it suggest an alternative approach that selects the Honeywords from existing user information, a generic password list, dictionary attack, and by shuffling the characters. Four sets of Honeywords are added to the system that resembles the real passwords, thereby achieving an extremely flat Honeywords generation method. To measure the human behaviors in relation to trying to crack the password, a tested engaged with by 820 people was created to determine the appropriate words for the traditional and proposed methods. |
Other Details |
|
Paper ID: IJSRDV6I110022 Published in: Volume : 6, Issue : 11 Publication Date: 01/11/2019 Page(s): 51-54 |
Article Preview |
|
|
|
|
