Performance Evaluating of Honeyword Generation Methods: Traditional versus AI

Shahad Abdulkhalik Alkazzaz, Saja Jasim Mohammed

Abstract


As the number of people using computers has increased, the risks to digital systems have increased too. That has necessitated the development of new techniques to defend against hackers. Authentication systems based on text passwords are an example of digital systems that face risks through internet use. Therefore, it was necessary to provide security and reliability to users while protecting their passwords. In the authentication database, A technique known as honeywords was used. In the digital world, honeywords are a popular technique used to enhance the security of users' actual passwords and are an additional strong layer of security. The benefit of this technique is its ability to detect unauthorized access attempts to the systems. In this paper, three of the most popular techniques for honeyword generation and other well-known intelligence algorithms are put in comparison using some evaluation metrics to study the performance of each one. The results illustrate a contrast in the performance of different techniques and intelligence algorithms based on the Hamming distance value.

Keywords


honeywords, honeywords generation, honey checker, passwords security

Full Text:

PDF

References


G. Belding, "What are Honeywords? Password Protection for Database Breaches," Security Boulevard, Sep. 22, 2018. [Online]. Available: https://securityboulevard.com. [Accessed: Jan. 3, 2025].

Z. Huang, L. Bauer, and M. K. Reiter, "The Impact of Exposed Passwords on Honeyword Efficacy," in 33rd USENIX Security Symposium, Sep. 19, 2023. [Online]. Available: https://www.usenix.org/conference/usenixsecurity24/presentation/huang-zonghao.

S. Sawant, P. Saptal, K. Lokhande, K. Gadhave, and R. Kaur, "Honeywords: Making Password Cracking Detectable," IJERAT, Apr. 2018. doi: 10.33103/uot.ijccce.22.4.15.

O. Z. Akif, A. F. Sabeeh, G. J. Rodgers, and H. S. Al-Raweshidy, "Achieving Flatness: Honeywords Generation Method for Passwords based on User Behaviors," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 3, 2019. doi: 10.14569/IJACSA.2019.0100305.

S. Pattabiraman, N. Soms, Poovanan, and S. Ramakrishna, "Password Protection using Honeywords," in ICACCABT (Coimbatore), 2020. doi: 10.46532/978-81-950008-1-4_001.

V. Thite and M. Nighot, "Honeyword for Security: A Review," IJASRET, vol. 6, May 5, 2021. doi: 10.51319/2456-0774.2021.5.0002.

D. Wang, H. Cheng, P. Wang, J. Yan, and X. Huang, "A Security Analysis of Honeywords," in Network and Distributed Systems Security (NDSS), Oct. 2017. doi: 10.14722/ndss.2018.12345.

M. Sheet and M. Jader, "A Comprehensive Study of Traditional and Deep-Learning Schemes for Privacy and Data Security in the Cloud," RJCM, Dec. 2022. doi: 10.33899/csmj.2022.176588.

N. B. A. Dabagh and M. S. Mahmood, "Multilevel Database Security for Android using Fast Encryption Methods," RJCM, Jun. 2022. doi: 10.33899/csmj.2022.174412.

I. O. A. M. Dahl and A. M. A. M. Haleem, "Key Generation based on Facial Biometrics," in IMDC-SDSP 2020, Cyberspace, Sep. 2020. doi: 10.4108/eai.28-6-2020.2298074.

S. J. Ahmed and D. B. Taha, "Machine Learning for Software Vulnerability Detection: A Survey," in ICCITM 2022, 2022. doi: 10.1109/ICCITM56309.2022.10031734.

G. Younis, I. Fathallah, and R. Mahdi, "New Approach for Data Encrypted and Hiding by EMD Method," IJOSS, Jun. 2020. doi: 10.33899/iqjoss.2020.0165443.

Y.-J. Tian, L. Li, H. Peng, D. Wang, and Y. Yang, "Honeywords Generation Mechanism based on Zero Divisor Graph Sequence," IEEE Transactions on Services Computing, vol. 16, 2023. doi: 10.1109/TSC.2023.3329013.

A. Akshima, D. Changy, A. Goelz, S. Mishray, and S. K. Sanadhyax, "Generation of Secure and Reliable Honeywords Preventing False Detection," IEEE Transactions on Dependable and Secure Computing, 2018. doi: 10.1109/TDSC.2018.2824323.

A. Dionysiou, V. Vassiliades, and E. Athanasopoulos, "Generating Honeywords using Representation Learning," in ASIA CCS 2021, 2021. doi: 10.1145/3433210.3453092.

Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "Generating Honeyword based on a Proposed Bees Algorithm," IJCCC, vol. 4, 2022. doi: 10.33103/uot.ijccce.22.4.15.

Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "Honeyword Generation using a Proposed Discrete Salp Swarm Algorithm," BSJ, vol. 20, Apr. 2023. doi: 10.21123/bsj.2022.6930.

M. A. Ahmed and O. Z. Akif, "Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet," WJPS, vol. 2, 2023. doi: 10.31185/wjps.269.

Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "A Proposed Harmony Search Algorithm for Honeyword Generation," Advances in Human‐Computer Interaction, vol. 2022, 2022. doi: 10.1155/2022/9607550.

Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "A Scrutiny of Honeywords Generation Methods: Remarks on Strengths and Weakness Points," Cybernetics and Information Technologies, vol. 22, 2022. doi: 10.1109/TDSC.2018.2824323.




DOI: https://doi.org/10.32520/stmsi.v14i2.4991

Article Metrics

Abstract view : 128 times
PDF - 21 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.