HoneyTree: Making Honeywords Sweeter

dc.contributor.author Das, Kuntal
dc.contributor.author Jafarian, Jafar Haadi
dc.contributor.author Gethner, Ellen
dc.contributor.author Dincelli, Ersin
dc.contributor.author Bekman, Thomas
dc.date.accessioned 2021-12-24T18:29:46Z
dc.date.available 2021-12-24T18:29:46Z
dc.date.issued 2022-01-04
dc.description.abstract Cyber deception is an area of cybersecurity based on building detection systems and verification models using decoys or controlled misinformation to confuse or misdirect the adversaries into revealing their presence and/or intentions. In the era of online services where our data is usually protected on the cloud relying on a secret key, even the most secure cyber systems can get compromised, losing highly confidential data to the attackers, including hashed passwords that can be cracked offline. Prior work has been done in carefully placing traps in the systems to detect intrusion activities. The Honeywords project by Juels and Rivest is the most straightforward and successful technique in detecting and deterring offline-password brute force by placing multiple plausible decoy passwords together along with the real password. In this paper, we enhance this approach and combine it with the concept of Merkle tree to build a new model called HoneyTree. Our model achieves twice the level of security as the Honeywords project at the same storage cost. We perform a detailed comparison of our approach to the original Honeywords project and analyze its pros and cons.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2022.917
dc.identifier.isbn 978-0-9981331-5-7
dc.identifier.uri http://hdl.handle.net/10125/80259
dc.language.iso eng
dc.relation.ispartof Proceedings of the 55th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Cyber Systems: Their Science, Engineering, and Security
dc.subject cyber deception
dc.subject hash inversion
dc.subject honeywords
dc.subject passive adversary detection
dc.title HoneyTree: Making Honeywords Sweeter
dc.type.dcmi text
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0745.pdf
Size:
363.89 KB
Format:
Adobe Portable Document Format
Description: