SECURED PASSWORD USING HONEYWORD ENCRYPTION

被引:0
|
作者
Shinde, Prashant D. [1 ]
Patil, Suhas H. [1 ]
机构
[1] Bharati Vidyapeeth, Dept Comp Engn, Coll Engn, Pune, Maharashtra, India
关键词
Authentication; honeypots; honeywords; login passwords; password cracking; Seed;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Background: The attacks on the database of security systems are often due to the advancement in the technology. Many users have a habit to keep the same password for multiple sites. So the leaked dataset will be vulnerable to such attacks. Methods: The new secret word is the blend of existing client passwords called nectar words. The counterfeit secret key is only the honeywords fundamentally. For every set of username and password, a set of relevant sweet word is developed in such a way that it's only valid component is the right catchphrase, however, rest of component of the dataset are honeywords. Eventually, when an intruder or hacker tries to gain access to the framework with a honeyword, a trigger is activated to inform the manager about spillage of secret key and dataset. Results: Honeywords to identify assaults against a hash secret key database. For every client account, the real watchword put away in the type of honeywords. On the off chance that aggressor Attack on secret word i.e. honeys words it can't make sure it is genuine secret key or honeyword. Conclusion: In this examination, we analyzed in detail with watchful consideration the honeyword system and present some remark to center around utilized frail focuses.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [1] Multi-Agent Integrated Password Management (MIPM) Application Secured With Encryption
    Awang, Norkhushaini
    Zukri, Nurul Hidayah Ahmad
    Rashid, Nor Aimuni Md
    Zulkifli, Zuhri Arafah
    Nazri, Nor Afifah Mohd
    [J]. 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [2] Secured encryption using chaotic carriers
    Lai, CH
    Zhou, CT
    Yu, MY
    [J]. PHYSICA SCRIPTA, 1999, 59 (03) : 198 - 203
  • [3] Secured Encryption using Chaotic Carriers
    Lai, C.H.
    Zhou, C.T.
    Yu, M.Y.
    [J]. Physica Scripta, 1999, 59 (2-3): : 198 - 203
  • [4] A Scheme to Create Secured Random Password Using Markov Chain
    Vaithyasubramanian, S.
    Christy, A.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 809 - 814
  • [5] Secured Aerial Photography using Homomorphic Encryption
    Sattar, Naw Safrin
    Adnan, Muhammad Abdullah
    Kali, Maimuna Begum
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 107 - 114
  • [6] Password Security Using Bcrypt with AES Encryption Algorithm
    Kumar, Narander
    Chaudhary, Priyanka
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 385 - 392
  • [7] Secured Key Management Scheme for Multicast Network Using Graphical Password
    Lavanya, S.
    SaravanaKumar, N. M.
    Vijayakumar, V.
    Thilagam, S.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04): : 1152 - 1159
  • [8] Encryption and Decryption using Password Based Encryption, MD5, and DES
    Dhany, Hanna Willa
    Izhari, Fahmi
    Fahmi, Hasanul
    Tulus
    Sutarman
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PUBLIC POLICY, SOCIAL COMPUTING AND DEVELOPMENT 2017 (ICOPOSDEV 2017), 2017, 141 : 293 - 298
  • [9] Secured Key Management Scheme for Multicast Network Using Graphical Password
    S. Lavanya
    N. M. SaravanaKumar
    V. Vijayakumar
    S. Thilagam
    [J]. Mobile Networks and Applications, 2019, 24 : 1152 - 1159
  • [10] Password secured speaker recognition using time and frequency domain features
    Prasad, K. Satya
    Sheela, K. Anitha
    Latha, M. Madhavi
    [J]. PROCEEDINGS OF THE FOURTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PATTERN RECOGNITION, AND APPLICATIONS, 2007, : 309 - +