Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

被引:2
作者
Chakraborty, Nilesh [1 ]
Li, Jianqiang [1 ]
Leung, Victor C. M. [1 ]
Mondal, Samrat [2 ]
Pan, Yi [3 ]
Luo, Chengwen [1 ]
Mukherjee, Mithun [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518000, Guangdong, Peoples R China
[2] Indian Inst Technol Patna, Dept Comp Sci, Patna 801106, Bihar, India
[3] Georgia State Univ, Dept Comp Sci, 33 Gilmer St, Atlanta, GA 30302 USA
[4] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Honeyword; inversion attack; security; usability; password-file; Honey-Checker;
D O I
10.1145/3552431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers' efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.
引用
收藏
页数:37
相关论文
共 50 条
  • [41] A survey of local/cooperative-based malicious information detection techniques in VANETs
    Muhammad Arshad
    Zahid Ullah
    Naveed Ahmad
    Muhammad Khalid
    Haithiam Criuckshank
    Yue Cao
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [42] A Survey on Securing 6G Wireless Communications based Optimization Techniques
    Abasi, Ammar K.
    Aloqaily, Moayad
    Ouni, Bassem
    Guizani, Mohsen
    Debbah, Merouane
    Karray, Fakhri
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 216 - 223
  • [43] A Survey on Machine Learning Techniques in Smart Grids Based on Wireless Sensor Networks
    Etman, Ashraf M.
    Abdalzaher, Mohamed S.
    Emran, Ahmed A.
    Yahya, Ahmed
    Shaaban, Mostafa
    IEEE ACCESS, 2025, 13 : 2604 - 2627
  • [44] Survey of different IDS using honeytoken based techniques to mitigate cyber threats
    Jogdand, Priyanka
    Padiya, Puja
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 802 - 807
  • [45] A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
    Nweke, Livinus Obiora
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 37 - 45
  • [46] A Survey of QEMU-Based Fault Injection Tools & Techniques for Emulating Physical Faults
    Bekele, Yohannes B.
    Limbrick, Daniel B.
    Kelly, John C.
    IEEE ACCESS, 2023, 11 : 62662 - 62673
  • [47] Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach
    Herbst, Jan
    Rueb, Matthias
    Sanon, Sogo Pierre
    Lipps, Christoph
    Schotten, Hans D.
    NETWORK, 2024, 4 (02): : 133 - 149
  • [48] Dependability in Embedded Systems: A Survey of Fault Tolerance Methods and Software-Based Mitigation Techniques
    Solouki, Mohammadreza Amel
    Angizi, Shaahin
    Violante, Massimo
    IEEE ACCESS, 2024, 12 : 180939 - 180967
  • [49] A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
    Alashhab, Abdussalam Ahmed
    Zahid, Mohd Soperi Mohd
    Azim, Mohamed A.
    Daha, Muhammad Yunis
    Isyaku, Babangida
    Ali, Shimhaz
    SYMMETRY-BASEL, 2022, 14 (08):
  • [50] Survey, taxonomy, and methods of QCA-based design techniques-part II: reliability and security
    Fazili, Mohammad Mudakir
    Shah, Mohsin Fayaz
    Naz, Syed Farah
    Shah, Ambika Prasad
    SEMICONDUCTOR SCIENCE AND TECHNOLOGY, 2022, 37 (06)