Header menu link for other important links
Generation of Secure and Reliable Honeywords, Preventing False Detection
A. Akshima, D. Chang, A. Goel, S. Mishra,
Published in Institute of Electrical and Electronics Engineers Inc.
Breach in password databases has been a frequent phenomena in the software industry. Often these breaches go undetected for years. Sometimes, even the companies involved are not aware of the breach. Even after they are detected, publicizing such attacks might not always be in the best interest of the companies. This calls for a strong breach detection mechanism. Juels et al. (in ACM-CCS 2013) suggest a method called ‘Honeywords’, for detecting password database breaches. Their idea is to generate multiple fake passwords, called honeywords and store them along with the real password. Any login attempt with honeywords is identified as a compromise of the password database, since legitimate users are not expected to know the honeywords corresponding to their passwords. The key components of their idea are (i) generation of honeywords, (ii) typo-safety measures for preventing false alarms, (iii) alarm policy upon detection, and (iv) testing robustness of the system against various attacks. IEEE
About the journal
JournalData powered by TypesetIEEE Transactions on Dependable and Secure Computing
PublisherData powered by TypesetInstitute of Electrical and Electronics Engineers Inc.