📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 10, ISSUE 2, FEBRUARY 2021

Malicious User Detection Using Honeyword and Honeypot

Unnimaya V. S, Jasmine Jose

DOI: 10.17148/IJARCCE.2021.10219

Abstract: In today’s world the important security threat is the disclosure of password files. To prevent such password file breaches, the Honeyword mechanism is introduced. Honeywords are decoy or fake passwords and it is a set of words which are very similar to the real passwords that is submitted by the user for a particular account. For every user’s account, the set of Honeywords are generated. Thus, the attacker get confused to detect the real passwords and Honeywords. The Honeyword concept was introduced to detect the failure and an unauthorized access. The mechanism of Honeypot is basically introduced for confusing the attacker and making difficult to distinguish between the actual data from the decoy data. Through this we can collect the attacker’s details without knowing them. Fake or decoy files are made available only when unauthorized access is detected by the Honeyword generation mechanism.

Keywords: Honeyword, Honeypot, SIM Blocking, Decoy data, Intruder.

How to Cite:

[1] Unnimaya V. S, Jasmine Jose, “Malicious User Detection Using Honeyword and Honeypot,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2021.10219