Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke
{"title":"重新审视安全性:Honeytokens与Google Authenticator相遇","authors":"Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke","doi":"10.1109/SEEDA-CECNSM57760.2022.9932907","DOIUrl":null,"url":null,"abstract":"In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"13 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security Revisited: Honeytokens meet Google Authenticator\",\"authors\":\"Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke\",\"doi\":\"10.1109/SEEDA-CECNSM57760.2022.9932907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.\",\"PeriodicalId\":68279,\"journal\":{\"name\":\"计算机工程与设计\",\"volume\":\"13 1\",\"pages\":\"1-8\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"计算机工程与设计\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"计算机工程与设计","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Revisited: Honeytokens meet Google Authenticator
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.
期刊介绍:
Computer Engineering and Design is supervised by China Aerospace Science and Industry Corporation and sponsored by the 706th Institute of the Second Academy of China Aerospace Science and Industry Corporation. It was founded in 1980. The purpose of the journal is to disseminate new technologies and promote academic exchanges. Since its inception, it has adhered to the principle of combining depth and breadth, theory and application, and focused on reporting cutting-edge and hot computer technologies. The journal accepts academic papers with innovative and independent academic insights, including papers on fund projects, award-winning research papers, outstanding papers at academic conferences, doctoral and master's theses, etc.