Enhancement of Security and Usability Standards with a Novel Storage Optimized Honeyword Generation Approach
Journal Title: Elysium Journal of Engineering Research and Management - Year 2017, Vol 4, Issue 5
Abstract
Among the modern security threats on password based authentication techniques, the brute force computation is the one that performs the inversion of hash values. Several technologies have been developed for the computation of brute force in the inversion attack. This threat can be mitigated by detecting the password cracking with the Honeyword based authentication protocol. Though various existing techniques have some limitations such as storage overhead, weak DoS resistivity and multiple system vulnerability. To overcome these existing drawbacks, a novel honeyword generation approach with the decoy data mechanism is proposed in this work. The Paired Distance Protocol is used in this work and implemented for evaluating the proposed technique. The performance of the proposed techniques is compared with the existing techniques and provides better results in the security with reduced storage overhead and storage cost.
Authors and Affiliations
Avinash Pandey, Dilip motwani
Implementation of Weight Monitoring Using RFID and Load Cell
An embedded system is the combination of both software and hardware components. Real Time Operating System (RTOS), hardware, application software are the components of embedded system. The embedded system is widely used...
EMPLOYMENT CHANCE PREDICTION BASED ON DECISION TREES AND NAIVE BAYES CLASSIFIER USING DATA MINING TECHNIQUES
Data Mining is the non-trivial extract information from a data set and transforms it into an understandable structure for further use. Data mining is the search for the relationship and global pattern that exi...
AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...
An Efficient Energy Aware Secure Routing In Medical Data Transmission for Body Sensor Network
The Body Sensor Network (BSN) technology is one of the most imperative technologies used in IOT-based modern healthcare system. In this Process, at first we address the several security requirements in in BSN based moder...
Event Driven Plasticity Model for Analyzing Activities through Eye Blink and Classical Conditions
Human proficiency in dealing with alternative dynamic circumstances and accomplishment of uninterrupted different tasks in usually non-stationary atmospheres has got the neuroscientists’ attention to realize the mechanis...