{"title":"使用Honeywords进行恶意用户检测","authors":"S. Thakur, S. Chaudhari, Bharti Joshi","doi":"10.1109/CSCITA55725.2023.10104807","DOIUrl":null,"url":null,"abstract":"Malicious users can steal user credentials by launching various attacks. In most of such scenarios, honeywords are proven to be the best way to detect failure and unauthorized access. However, there are some flaws in honeyword based malicious user detection systems such as lack of integrity handling and robust confidentiality mechanism. We have proposed hybrid approach for honeyword generation using chaffing by tweaking digit and take a tail method. We also proposed modified BLAST algorithm to detect malicious users. If a fraudulent user is detected, an email is sent to the administrator. Additionally, QR Code is being used to strengthen overall security of login process. The proposed approach reduces risk of data theft from users. The hybrid model is performing better compared with all other honeyword generation techniques. In addition, user password hashes are stored in the database, reducing the risk of password cracking.","PeriodicalId":224479,"journal":{"name":"2023 International Conference on Communication System, Computing and IT Applications (CSCITA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malicious User Detection using Honeywords\",\"authors\":\"S. Thakur, S. Chaudhari, Bharti Joshi\",\"doi\":\"10.1109/CSCITA55725.2023.10104807\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malicious users can steal user credentials by launching various attacks. In most of such scenarios, honeywords are proven to be the best way to detect failure and unauthorized access. However, there are some flaws in honeyword based malicious user detection systems such as lack of integrity handling and robust confidentiality mechanism. We have proposed hybrid approach for honeyword generation using chaffing by tweaking digit and take a tail method. We also proposed modified BLAST algorithm to detect malicious users. If a fraudulent user is detected, an email is sent to the administrator. Additionally, QR Code is being used to strengthen overall security of login process. The proposed approach reduces risk of data theft from users. The hybrid model is performing better compared with all other honeyword generation techniques. In addition, user password hashes are stored in the database, reducing the risk of password cracking.\",\"PeriodicalId\":224479,\"journal\":{\"name\":\"2023 International Conference on Communication System, Computing and IT Applications (CSCITA)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Communication System, Computing and IT Applications (CSCITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCITA55725.2023.10104807\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Communication System, Computing and IT Applications (CSCITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCITA55725.2023.10104807","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malicious users can steal user credentials by launching various attacks. In most of such scenarios, honeywords are proven to be the best way to detect failure and unauthorized access. However, there are some flaws in honeyword based malicious user detection systems such as lack of integrity handling and robust confidentiality mechanism. We have proposed hybrid approach for honeyword generation using chaffing by tweaking digit and take a tail method. We also proposed modified BLAST algorithm to detect malicious users. If a fraudulent user is detected, an email is sent to the administrator. Additionally, QR Code is being used to strengthen overall security of login process. The proposed approach reduces risk of data theft from users. The hybrid model is performing better compared with all other honeyword generation techniques. In addition, user password hashes are stored in the database, reducing the risk of password cracking.