Enhancement of Security and Usability Standards with a Novel Storage Optimized Honeyword Generation Approach
Journal Title: Elysium Journal of Engineering Research and Management - Year 2017, Vol 4, Issue 5
Abstract
Among the modern security threats on password based authentication techniques, the brute force computation is the one that performs the inversion of hash values. Several technologies have been developed for the computation of brute force in the inversion attack. This threat can be mitigated by detecting the password cracking with the Honeyword based authentication protocol. Though various existing techniques have some limitations such as storage overhead, weak DoS resistivity and multiple system vulnerability. To overcome these existing drawbacks, a novel honeyword generation approach with the decoy data mechanism is proposed in this work. The Paired Distance Protocol is used in this work and implemented for evaluating the proposed technique. The performance of the proposed techniques is compared with the existing techniques and provides better results in the security with reduced storage overhead and storage cost.
Authors and Affiliations
Avinash Pandey, Dilip motwani
STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android applicat...
Efficient Image Re-coloring Mechanism for Color Vision Deficient (CVD) Persons
Color blindness is the state of decreased ability to identify differences between colors. In order to help the persons having color blindness the colors in the images can be changed so that the persons can be able to rec...
SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS
An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute rev...
SURVEY ON NETWORK DEFENCE SYSTEM [NDS] FOR CRYPTOGRAPHY AND HYBRID NETWORK SECURITY SYSTEM
Many computing systems have recently and preventing hacking is important in protecting business. Many significant security methodologies have been proposed to provide security between hacking. Fortunate...
COMPARATIVE ANALYSIS OF CANTILEVER TYPE MEMS DEVICE FOR HUMIDITY MEASUREMENT
This paper presents research on water content present in transformer oils. Online moisture measurements were analyzed by using different designs of MEMS humidity sensor. The measurement of humidity is of great importance...