Generating Honeyword Based on A Proposed Bees Algorithm | ||
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING | ||
Volume 22, Issue 4, December 2022, Pages 177-191 PDF (647.85 K) | ||
Document Type: Research Paper | ||
DOI: https://doi.org/10.33103/uot.ijccce.22.4.15 | ||
Authors | ||
Yasser A. Yasser* 1; Ahmed T. Sadiq1; Wasim AlHamdani2 | ||
1Computer Science Department, University of Technology, Baghdad, Iraq | ||
2Information Technology Department, University of the Cumberlands, KY, US | ||
Abstract | ||
Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database will contain many honeywords for each user in the system. A silent alarm will trigger, indicating that the password database has been compromised if the hacker signs in using a honeyword. The honeychecker is a separate server in charge of recognizing the real password and raising the silent alarm. Many honeyword creation techniques have been presented previously. They all have limitations in the generating process, supporting characteristics, and strengths of honeyword. The bees algorithm, an optimization metaheuristic swarm intelligence algorithm, is used in this article to suggest a novel approach for generating honeywords. The proposed bee algorithm succeeded in addressing the limitations of the previous methods by enhancing the honeyword generating process, supporting the honeyword characteristics, and addressing the honeyword system problems. The most important characteristics of the honeyword (flatness, DoS resistance, and storage) were supported by the proposed method to present unconditionally flatness, strong DoS resistance, and moderate storage. | ||
Keywords | ||
Bees Algorithm; Honeyword; Password; Swarm Algorithm | ||
Statistics Article View: 25 PDF Download: 16 |