Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

Author:

Chakraborty Nilesh1ORCID,Li Jianqiang1ORCID,Leung Victor C. M.1ORCID,Mondal Samrat2ORCID,Pan Yi3ORCID,Luo Chengwen1ORCID,Mukherjee Mithun4ORCID

Affiliation:

1. College of Computer Science and Software Engineering, Shenzhen University, Nanshan, Shenzhen, Guangdong, China

2. Department of Computer Science, Indian Institute of Technology Patna, Dist. Bhita, Patna, India

3. Department of Computer Science, Georgia State University, Georgia, Atlanta, USA

4. School of Artificial Intelligence, Nanjing University of Information Science and Technology, Nanjing, China

Abstract

Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers’ efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.

Funder

National Science Foundation of China

Natural Science Foundation of Guangdong Province

Stable Support Plan for Higher Education Institutions in Shenzhen

Technology Planning Project of Shenzhen City

Guangdong Pearl River Talent Recruitment Program

Guangdong Pearl River Talent Plan

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference85 articles.

1. Oleg Afonin. 2016. Building a Distributed Network in the Cloud: Using Amazon EC2 to Break Passwords. https://blog.elcomsoft.com/2016/07/building-a-distributed-network-in-the-cloud-using-amazon-ec2-to-break-passwords. (2016). Last Accessed: 2022-03-18.

2. Generation of Secure and Reliable Honeywords, Preventing False Detection

3. ErsatzPasswords

4. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock

5. Lorenzo Franceschi Bicchierai. 2016. Hacker Tries To Sell 427 Million Stolen MySpace Passwords For $2 800. https://www.vice.com/en_us/article/pgkk8v/427-million-myspace-passwords-emails-data-breach. (2016). Last Accessed: 2019-09-04.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16

2. The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords;2023 IEEE Conference on Communications and Network Security (CNS);2023-10-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3