Performance Evaluating of Honeyword Generation Methods: Traditional versus AI
Abstract
Keywords
Full Text:
PDFReferences
G. Belding, "What are Honeywords? Password Protection for Database Breaches," Security Boulevard, Sep. 22, 2018. [Online]. Available: https://securityboulevard.com. [Accessed: Jan. 3, 2025].
Z. Huang, L. Bauer, and M. K. Reiter, "The Impact of Exposed Passwords on Honeyword Efficacy," in 33rd USENIX Security Symposium, Sep. 19, 2023. [Online]. Available: https://www.usenix.org/conference/usenixsecurity24/presentation/huang-zonghao.
S. Sawant, P. Saptal, K. Lokhande, K. Gadhave, and R. Kaur, "Honeywords: Making Password Cracking Detectable," IJERAT, Apr. 2018. doi: 10.33103/uot.ijccce.22.4.15.
O. Z. Akif, A. F. Sabeeh, G. J. Rodgers, and H. S. Al-Raweshidy, "Achieving Flatness: Honeywords Generation Method for Passwords based on User Behaviors," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 3, 2019. doi: 10.14569/IJACSA.2019.0100305.
S. Pattabiraman, N. Soms, Poovanan, and S. Ramakrishna, "Password Protection using Honeywords," in ICACCABT (Coimbatore), 2020. doi: 10.46532/978-81-950008-1-4_001.
V. Thite and M. Nighot, "Honeyword for Security: A Review," IJASRET, vol. 6, May 5, 2021. doi: 10.51319/2456-0774.2021.5.0002.
D. Wang, H. Cheng, P. Wang, J. Yan, and X. Huang, "A Security Analysis of Honeywords," in Network and Distributed Systems Security (NDSS), Oct. 2017. doi: 10.14722/ndss.2018.12345.
M. Sheet and M. Jader, "A Comprehensive Study of Traditional and Deep-Learning Schemes for Privacy and Data Security in the Cloud," RJCM, Dec. 2022. doi: 10.33899/csmj.2022.176588.
N. B. A. Dabagh and M. S. Mahmood, "Multilevel Database Security for Android using Fast Encryption Methods," RJCM, Jun. 2022. doi: 10.33899/csmj.2022.174412.
I. O. A. M. Dahl and A. M. A. M. Haleem, "Key Generation based on Facial Biometrics," in IMDC-SDSP 2020, Cyberspace, Sep. 2020. doi: 10.4108/eai.28-6-2020.2298074.
S. J. Ahmed and D. B. Taha, "Machine Learning for Software Vulnerability Detection: A Survey," in ICCITM 2022, 2022. doi: 10.1109/ICCITM56309.2022.10031734.
G. Younis, I. Fathallah, and R. Mahdi, "New Approach for Data Encrypted and Hiding by EMD Method," IJOSS, Jun. 2020. doi: 10.33899/iqjoss.2020.0165443.
Y.-J. Tian, L. Li, H. Peng, D. Wang, and Y. Yang, "Honeywords Generation Mechanism based on Zero Divisor Graph Sequence," IEEE Transactions on Services Computing, vol. 16, 2023. doi: 10.1109/TSC.2023.3329013.
A. Akshima, D. Changy, A. Goelz, S. Mishray, and S. K. Sanadhyax, "Generation of Secure and Reliable Honeywords Preventing False Detection," IEEE Transactions on Dependable and Secure Computing, 2018. doi: 10.1109/TDSC.2018.2824323.
A. Dionysiou, V. Vassiliades, and E. Athanasopoulos, "Generating Honeywords using Representation Learning," in ASIA CCS 2021, 2021. doi: 10.1145/3433210.3453092.
Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "Generating Honeyword based on a Proposed Bees Algorithm," IJCCC, vol. 4, 2022. doi: 10.33103/uot.ijccce.22.4.15.
Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "Honeyword Generation using a Proposed Discrete Salp Swarm Algorithm," BSJ, vol. 20, Apr. 2023. doi: 10.21123/bsj.2022.6930.
M. A. Ahmed and O. Z. Akif, "Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet," WJPS, vol. 2, 2023. doi: 10.31185/wjps.269.
Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "A Proposed Harmony Search Algorithm for Honeyword Generation," Advances in HumanâComputer Interaction, vol. 2022, 2022. doi: 10.1155/2022/9607550.
Y. A. Yasser, A. T. Sadiq, and W. AlHamdani, "A Scrutiny of Honeywords Generation Methods: Remarks on Strengths and Weakness Points," Cybernetics and Information Technologies, vol. 22, 2022. doi: 10.1109/TDSC.2018.2824323.
DOI: https://doi.org/10.32520/stmsi.v14i2.4991
Article Metrics
Abstract view : 128 timesPDF - 21 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.