Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Honey Words ďDetecting Password Cracking With Hacker TrackingĒ

Author : Ashwini Yele 1 Pranali Pangerkar 2 Prita Patil 3

Date of Publication :7th March 2016

Abstract: For each user account, the legitimate password is stored with several honey words in order to sense impersonation. If honey words are selected properly, an adversary who steals a file of hashed passwords cannot be sure if it is the real password or a honey word for any account. Moreover, entering with a honey word to login will trigger an alarm notifying the administrator about a password file breach. At the expense of increasing storage requirement by 20 times, a simple and effective solution to detection of password file disclosure events. In this study, we advance the honey word system by introducing a concept of decoy files. Also, we suggest an alternative approach that selects honey words from existing user passwords in the system to provide realistic honey words Ė a perfectly flat honey word generation method.

Reference :

    1. Ritvars Bregzis,Calvin Gotlieb,Carole Moore , “The Beginning of Automation in the University of Toronto Library,1963–1972”, in IEEE Annals of the History of Computing, April–June 2002..
    2. Prof. Godswill Obioma , Prof. Ismail Junaidu , Dr. Grace Ajagun , ‚ÄēThe Automation of Educational Assessment in Nigeria: Challenged and Implications for Pre-Service Teacher Educaion‚ÄĖ,Annual Conference of the International Association for Educational Assessment (IAEA) held at the Dan Panorama Hotel, Tel-Aviv, Isreal October 20th – 25th, 2013
    3. M. Jou,J.K. Shiau and H.W. Zhang,‚ÄĖApplication of Web Technologies in Automationon Technology Education‚ÄĖ, International Journal of Computers and Applications, Vol. 31, No. 4, 2009
    4. Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, Jigang Liu,‚ÄĖ APOGEE – Automated Project Grading and Instant Feedback System for Web Based Computing‚ÄĖ, Computer Science and Information Technology, 2nd IEEE International Conference 2009.
    5. Gerald Weber,‚ÄĖ Defining the Paperless Workplace with the Paper Metaphor -Not a Contradiction in Terms‚ÄĖ,Conference: Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 120
    6. Ryan AusankaCrues,‚ÄĖ Methods for Access Control:Advances and Limitations”,Ryan Ausanka-Crues Harvey Mudd College 301 Platt Blvd Claremont, California ,2001
    7. Ravi S. Sandhu{, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youman,” Role-Based Access Control Models”, IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47.
    8. Hamid Hatim, Hanan El Bakkali, Ilham Berrada,‚ÄĖ Workflow Access Control: From Role Engineering to Task Engineering‚ÄĖInternation Journal Internet Technology and Secured Transactions Vol 4, no.1, 2012
    9. Noorr Azah Samsudin,Shamsul Kamal Ahmad Khalid et.al. ,”Procedure Automation with Immediate User Notification : A Case Study”, IEEE Symposium on Buisness, Engineering and Industrial Applicatins, Malaysia, 2011.
    10. Andrew Rebeiro-Hargrave1, Hiroshi Nakajima, ‚ÄēInvestigation into Blood Pressure Variability in Japan and Bangladesh by ICT based Healthcare Systems”, 2014 IEEE International Conference on Systems, Man, and Cybernetics October 5-8, 2014
    11. Reinhardt A. Botha, Jan H.P. Eloff,‚ÄĖ Designing Role Hierarchies for Access Control in Workflow Systems‚ÄĖ, 0- 7695-1372-7101 $10.00 0 2001

Recent Article