Generation of Secure and Reliable Honeywords, Preventing False Detection
Citations
References
1,068 citations
"Generation of Secure and Reliable H..." refers background in this paper
...Humans have a tendency to choose the same password for multiple websites [17]....
[...]
...This attack is also motivated by the tendency of humans to choose the same password for multiple websites [17]....
[...]
...It is common human tendency to use the same password for multiple sites [17]....
[...]
1,015 citations
"Generation of Secure and Reliable H..." refers methods in this paper
...‘Dictionary attack’ [2] is the most widely used attack technique for retrieving a password from its hash value....
[...]
524 citations
"Generation of Secure and Reliable H..." refers background in this paper
...Use of salt prevents specialized attacks like the rainbow table attack [3], when considering a large collection of hashes....
[...]
491 citations
"Generation of Secure and Reliable H..." refers methods in this paper
...The work [24] suggests a method to compute the probability based on the frequency of each token in the password....
[...]
...quencies of each password enlisted in an existing database and also computes the frequency of each individual tokens (alphabets-strings, digitsstrings, special-characters-strings) of the password following the technique suggested in [24]....
[...]
...To match the frequency considering the tokens, we follow the technique proposed in [24], where the probability of the honeyword is the product of the probabilities of the tokens used to derive it....
[...]
444 citations
"Generation of Secure and Reliable H..." refers background in this paper
...User selected passwords are mostly predictable, since humans have a tendency to choose non-random and easy to remember passwords [1]....
[...]