Detection of Burglar and Password Security Through Honeywords With IP Blocking
Keywords:
tweaking, chaffing, mechanism, HoneywordsAbstract
This abstract presents the work related to the password security. The presented work consists of two main parts. The first part is related to the generation of Honeywords and the second part is associated with IP blocking.
For the first part of generation of Honeywords, we will use the method of chaffing-by-tail-tweaking method in which the last t positions of password are chosen and are altered. Using this mechanism, Honeywords are generated.
For the second part of IP blocking, we have to first log the IP of the user to monitor its activity and based on that we can choose whether to block the IP or not. For logging the IP, we have to use environment variables of the server.
References
A. Juels and R.L. Rivest, “Honeywords: Making Password Cracking Detectable”, In Proceedings of the 2013 ACM SIGSAC conference on Computer & communication security, p. 145-169, November 2013.
Brown and Kelly, “The dangers of weak hashes”, SANS Institute Infosec Reading Room, November 2013.
C. Sharma and S.C. Jain, “Analysis and classification of SQL injection vulnerabilities and attacks on web applications”, 2014 International Conference on Advances in Engineering & Technology Research, August 2014
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.