HoneyTree: Making Honeywords Sweeter
HoneyTree: Making Honeywords Sweeter
dc.contributor.author | Das, Kuntal | |
dc.contributor.author | Jafarian, Jafar Haadi | |
dc.contributor.author | Gethner, Ellen | |
dc.contributor.author | Dincelli, Ersin | |
dc.contributor.author | Bekman, Thomas | |
dc.date.accessioned | 2021-12-24T18:29:46Z | |
dc.date.available | 2021-12-24T18:29:46Z | |
dc.date.issued | 2022-01-04 | |
dc.description.abstract | Cyber deception is an area of cybersecurity based on building detection systems and verification models using decoys or controlled misinformation to confuse or misdirect the adversaries into revealing their presence and/or intentions. In the era of online services where our data is usually protected on the cloud relying on a secret key, even the most secure cyber systems can get compromised, losing highly confidential data to the attackers, including hashed passwords that can be cracked offline. Prior work has been done in carefully placing traps in the systems to detect intrusion activities. The Honeywords project by Juels and Rivest is the most straightforward and successful technique in detecting and deterring offline-password brute force by placing multiple plausible decoy passwords together along with the real password. In this paper, we enhance this approach and combine it with the concept of Merkle tree to build a new model called HoneyTree. Our model achieves twice the level of security as the Honeywords project at the same storage cost. We perform a detailed comparison of our approach to the original Honeywords project and analyze its pros and cons. | |
dc.format.extent | 10 pages | |
dc.identifier.doi | 10.24251/HICSS.2022.917 | |
dc.identifier.isbn | 978-0-9981331-5-7 | |
dc.identifier.uri | http://hdl.handle.net/10125/80259 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 55th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cyber Systems: Their Science, Engineering, and Security | |
dc.subject | cyber deception | |
dc.subject | hash inversion | |
dc.subject | honeywords | |
dc.subject | passive adversary detection | |
dc.title | HoneyTree: Making Honeywords Sweeter | |
dc.type.dcmi | text |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 0745.pdf
- Size:
- 363.89 KB
- Format:
- Adobe Portable Document Format
- Description: