Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

被引:2
作者
Chakraborty, Nilesh [1 ]
Li, Jianqiang [1 ]
Leung, Victor C. M. [1 ]
Mondal, Samrat [2 ]
Pan, Yi [3 ]
Luo, Chengwen [1 ]
Mukherjee, Mithun [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518000, Guangdong, Peoples R China
[2] Indian Inst Technol Patna, Dept Comp Sci, Patna 801106, Bihar, India
[3] Georgia State Univ, Dept Comp Sci, 33 Gilmer St, Atlanta, GA 30302 USA
[4] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Honeyword; inversion attack; security; usability; password-file; Honey-Checker;
D O I
10.1145/3552431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers' efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] A survey of intrusion detection techniques based on negative selection algorithm
    Kuldeep Singh
    Lakhwinder Kaur
    Raman Maini
    International Journal of System Assurance Engineering and Management, 2022, 13 : 175 - 185
  • [32] MADS Based on DL Techniques on the Internet of Things (IoT): Survey
    Talal, Hussah
    Zagrouba, Rachid
    ELECTRONICS, 2021, 10 (21)
  • [33] A survey of intrusion detection techniques based on negative selection algorithm
    Singh, Kuldeep
    Kaur, Lakhwinder
    Maini, Raman
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 175 - 185
  • [34] Authentication in cloud-driven IoT-based big data environment: Survey and outlook
    Wazid, Mohammad
    Das, Ashok Kumar
    Hussain, Rasheed
    Succi, Giancarlo
    Rodrigues, Joel J. P. C.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 : 185 - 196
  • [35] A Survey Of differential privacy-based techniques and their applicability to location-Based services
    Kim, Jong Wook
    Edemacu, Kennedy
    Kim, Jong Seon
    Chung, Yon Dohn
    Jang, Beakcheol
    COMPUTERS & SECURITY, 2021, 111
  • [36] A Survey of Machine Learning-based loT Intrusion Detection Techniques
    Long, Jing
    Fang, Fei
    Luo, Haibo
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 7 - 12
  • [37] A Survey on Machine-Learning Techniques for UAV-Based Communications
    Bithas, Petros S.
    Michailidis, Emmanouel T.
    Nomikos, Nikolaos
    Vouyioukas, Demosthenes
    Kanatas, Athanasios G.
    SENSORS, 2019, 19 (23)
  • [38] Pattern-Based Survey and Categorization of Network Covert Channel Techniques
    Wendzel, Steffen
    Zander, Sebastian
    Fechner, Bernhard
    Herdin, Christian
    ACM COMPUTING SURVEYS, 2015, 47 (03)
  • [39] A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification
    AlJanah, Salem
    Zhang, Ning
    Tay, Siok Wah
    IEEE ACCESS, 2021, 9 : 130914 - 130927
  • [40] A survey of local/cooperative-based malicious information detection techniques in VANETs
    Arshad, Muhammad
    Ullah, Zahid
    Ahmad, Naveed
    Khalid, Muhammad
    Criuckshank, Haithiam
    Cao, Yue
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,