Have a personal or library account? Click to login
A Proposal for Honeyword Generation via Meerkat Clan Algorithm Cover

A Proposal for Honeyword Generation via Meerkat Clan Algorithm

Open Access
|Apr 2022

References

  1. 1. Mukthineni, V., R. Mukthineni, O. Sharma, S. J. Narayanan. Face Authenticated Hand Gesture Based Human Computer Interaction for Desktops. – Cybernernetics and Information Technologies., Vol. 20, 2020, No 4, pp. 74-89.10.2478/cait-2020-0048
  2. 2. M. Lehto, P. Neittaanmäki, Eds. Cyber Security: Analytics, Technology and Automation. – Cham, Springer International Publishing, Vol. 78. 2015.10.1007/978-3-319-18302-2
  3. 3. Genç, Z. A., S. Kardaş, M. S. Kiraz. Examination of a New Defense Mechanism: Honeywords. – In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). G. P. Hancke, E. Damiani, Eds. Cham, Springer International Publishing. Vol. 10741. 2018, pp. 130-139.
  4. 4. Kusuma, A. B., Y. R. Pramadi. Implementation of Honeywords as a Codeigniter Library for a Solution to Password-Cracking Detection. – IOP Conf. Ser. Mater. Sci. Eng., Vol. 508, May 2019, No 1, p. 012134. DOI: 10.1088/1757-899X/508/1/012134.10.1088/1757-899X/508/1/012134
  5. 5. Win, T., K. S. M. Moe. Protecting Private Data Using Improved Honey Encryption and Honeywords Generation Algorithm. – Adv. Sci. Technol. Eng. Syst., Vol. 3, 2018, No 5, pp. 311-320. DOI: 10.25046/aj030537.10.25046/aj030537
  6. 6. Chakraborty, N., S. Mondal. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches. – Procedia Comput. Sci., Vol. 93, 2016, No September, pp. 799-807. DOI: 10.1016/j.procs.2016.07.298.10.1016/j.procs.2016.07.298
  7. 7. Wang, R., H. Chen, J. Sun. Phoney: Protecting Password Hashes with Threshold Cryptology and Honeywords. – Int. J. Embed. Syst., Vol. 8, 2016, No 2-3, pp. 146-154. DOI: 10.1504/IJES.2016.076108.10.1504/IJES.2016.076108
  8. 8. Palaniappan, S., V. Parthipan, S. Stewart Kirubakaran, R. Johnson. Secure User Authentication Using Honeywords. – Lecture Notes on Data Engineering and Communications Technologies, Vol. 31, 2020, pp. 896-903.10.1007/978-3-030-24643-3_105
  9. 9. Homayouni, S. M., D. B. M. M. Fontes. Metaheuristic Algorithms – Metaheuristics for Maritime Operations. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2018, pp. 21-38.10.1002/9781119483151.ch2
  10. 10. Tezel, B. T., A. Mert. A Cooperative System for Metaheuristic Algorithms. – Expert Syst. Appl., Vol. 165, 2021, No May 2020, p. 113976. DOI: 10.1016/j.eswa.2020.113976.10.1016/j.eswa.2020.113976
  11. 11. Toshev, A. Particle Swarm Optimization and Tabu Search Hybrid Algorithm for Flexible Job Shop Scheduling Problem – Analysis of Test Results. – Cybernernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 26-44.10.2478/cait-2019-0034
  12. 12. Kumar, A., D. Kumar, S. K. Jarial. A Review on Artificial Bee Colony Algorithms and Their Applications to Data Clustering. – Cybernernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 3-28.10.1515/cait-2017-0027
  13. 13. Green, D., A. Aleti, J. Garcia. The Nature of Nature: Why Nature-Inspired Algorithms Work. – Model. Optim. Sci. Technol., Vol. 10, 2017, pp. 1-27. DOI: 10.1007/978-3-319-50920-4_1.10.1007/978-3-319-50920-4_1
  14. 14. Al-Obaidi, A. T. S., H. S. Abdullah, Z. O. Ahmed. Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, 2018, No 1. pp. 354-360. DOI: 10.11591/ijeecs.v10.i1.10.11591/ijeecs.v10.i1
  15. 15. Abd Alradha Alsaidi, S. A., D. K. Muhsen, S. M. Ali. Improved Scatter Search Algorithm Based on Meerkat Clan Algorithm to Solve NP-Hard Problems. – Period. Eng. Nat. Sci., Vol. 8, 2020, No 3. DOI: 10.21533/pen.v8i3.1563.
  16. 16. Jameel, N., H. S. Abdullah. A Proposed Intelligent Features Selection Method Using Meerkat Clan Algorithm. – J. Phys. Conf. Ser., Vol. 1804, February 2021, No 1, p. 012061. DOI: 10.1088/1742-6596/1804/1/012061.10.1088/1742-6596/1804/1/012061
  17. 17. Juels, A., R. L. Rivest. Honeywords: Making Password-Cracking Detectable. – In: Proc. of 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS’13), 2013, No October 2015, pp. 145-160. DOI: 10.1145/2508859.2516671.10.1145/2508859.2516671
  18. 18. Erguler, I. Achieving Flatness: Selecting the Honeywords from Existing User Passwords. – IEEE Trans. Dependable Secur. Comput., Vol. 13, March 2015, No 2, pp. 284-295. DOI: 10.1109/TDSC.2015.2406707.10.1109/TDSC.2015.2406707
  19. 19. Chakraborty, N., S. Mondal. On Designing a Modified-UI Based Honeyword Generation Approach for Overcoming the Existing Limitations. – Comput. Secur., Vol. 66, 2017, pp. 155-168. DOI: 10.1016/j.cose.2017.01.011.10.1016/j.cose.2017.01.011
  20. 20. Akshima, A., D. Chang, A. Goel, S. Mishra, S. K. Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection. – IEEE Trans. Dependable Secur. Comput., Vol. 5971, 2018, No c, pp. 1-13. DOI: 10.1109/TDSC.2018.2824323.10.1109/TDSC.2018.2824323
  21. 21. Akif, O. Z., A. F. Sabeeh, G. J. Rodgers, H. S. Al-Raweshidy. Achieving Flatness: Honeywords Generation Method for Passwords Based on User Behaviours. – Int. J. Adv. Comput. Sci. Appl., Vol. 10, 2019, No 3, pp. 28-37. DOI: 10.14569/IJACSA.2019.0100305.10.14569/IJACSA.2019.0100305
  22. 22. Brindtha, J., K. R. Hithaeishini, R. Komala, G. Abirami, U. Arul. Identification and Detecting of Attacker in a Purchase Portal Using Honeywords. – In: Proc. of 3rd IEEE Int. Conf. Sci. Technol. Eng. Manag. (ICONSTEM’17), Vol. 2018-Janua, 2017, pp. 389-393. DOI: 10.1109/ICONSTEM.2017.8261414.10.1109/ICONSTEM.2017.8261414
  23. 23. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. Vazquez Sandoval. A Critical Security Analysis of the Password-Based Authentication Honeywords System under Code-Corruption Attack. – Communications in Computer and Information Science, Vol. 977, 2019, pp. 125-151.10.1007/978-3-030-25109-3_7
  24. 24. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. V. Sandoval. A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. – In: Proc. of 4th International Conference on Information Systems Security and Privacy, Vol. 2018-Janua, 2018, No Icissp, pp. 83-95. DOI: 10.5220/0006609100830095.10.5220/0006609100830095
  25. 25. Catuogno, L., A. Castiglione, F. Palmieri. A Honeypot System with Honeyword-Driven Fake Interactive Sessions. – In: Proc. of 2015 Int. Conf. High Perform. Comput. Simulation (HPCS’15), 2015, pp. 187-194. DOI: 10.1109/HPCSim.2015.7237039.10.1109/HPCSim.2015.7237039
  26. 26. Nathezhtha, T., V. Vaidehi. Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. – Commun. Comput. Inf. Sci., Vol. 746, 2017, pp. 159-169. DOI: 10.1007/978-981-10-6898-0_13.10.1007/978-981-10-6898-0_13
  27. 27. Moe, K. S. M., T. Win. Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack. – In: 2017 International Symposium on Electronics and Smart Devices (ISESD’17), Vol. 2018-Janua, October 2017, pp. 1-5. DOI: 10.1109/ISESD.2017.8253295.10.1109/ISESD.2017.8253295
DOI: https://doi.org/10.2478/cait-2022-0003 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 40 - 59
Submitted on: Dec 2, 2021
|
Accepted on: Jan 11, 2022
|
Published on: Apr 10, 2022
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Yasser A. Yasser, Ahmed T. Sadiq, Wasim AlHamdani, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.