Please use this identifier to cite or link to this item:
http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/1149
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Akshima, A. | - |
dc.contributor.author | Chang, D. | - |
dc.contributor.author | Goel, A. | - |
dc.contributor.author | Mishra, S. | - |
dc.contributor.author | Sanadhya, S.K. | - |
dc.date.accessioned | 2018-12-31T07:01:57Z | - |
dc.date.available | 2018-12-31T07:01:57Z | - |
dc.date.issued | 2018-12-31 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1149 | - |
dc.description.abstract | —Breach in password databases has been a frequent phenomena in the software industry. Often these breaches go undetected for years. Sometimes, even the companies involved are not aware of the breach. Even after they are detected, publicizing such attacks might not always be in the best interest of the companies. This calls for a strong breach detection mechanism. Juels et al. (in ACM-CCS 2013) suggest a method called ‘Honeywords’, for detecting password database breaches. Their idea is to generate multiple fake passwords, called honeywords and store them along with the real password. Any login attempt with honeywords is identified as a compromise of the password database, since legitimate users are not expected to know the honeywords corresponding to their passwords. The key components of their idea are (i) generation of honeywords, (ii) typo-safety measures for preventing false alarms, (iii) alarm policy upon detection, and (iv) testing robustness of the system against various attacks. In this work, we analyze the limitations of existing honeyword generation techniques. We propose a new attack model called ‘Multiple System Intersection attack considering Input’. We show that the ‘Paired Distance Protocol’ proposed by Chakraborty et al., is not secure in this attack model. We also propose new and more practical honeyword generation techniques and call them the ‘evolving-password model’, the ‘user-profile model’, and the ‘append-secret model’. These techniques achieve ‘approximate flatness’, implying that the honeywords generated using these techniques are indistinguishable from passwords with high probability. Our proposed techniques overcome most of the risks and limitations associated with existing techniques. We prove flatness of our ‘evolving-password model’ technique through experimental analysis. We provide a comparison of our proposed models with the existing ones under various attack models to justify our claims. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Password | en_US |
dc.subject | Honeywords | en_US |
dc.subject | Password hash breach | en_US |
dc.subject | Detection technique | en_US |
dc.subject | Authentication | en_US |
dc.subject | Security | en_US |
dc.title | Generation of secure and reliable honeywords, preventing false detection | en_US |
dc.type | Article | en_US |
Appears in Collections: | Year-2018 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Text.pdf | 786 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.