Rat trap: inviting, detection & identification of attacker using honey words in purchase portal

A Karthik, MD Kamalesh - 2017 Third International Conference …, 2017 - ieeexplore.ieee.org
In today's Internet world the authentication of data plays efficient way in the security of data.
Nowadays online purchase is done by customers for easy access and delivery of product on …

Analysis of Authentication on Online Purchase Using Honey Password

B Sudramurthy, M Al Obaidy… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This research study is intended to solve the security threats of using passwords in
purchasing products online. After thorough study, the researchers found out that there is a …

Detection and avoidance of attacker using honey words in purchase portal

PB Shamini, E Dhivya, S Jayasree… - 2017 Third …, 2017 - ieeexplore.ieee.org
Passwords that are used over the Internet provides less security to the customers. There are
millions of security problem that affects the users. As the hacker affects the whole system by …

Secure user authentication using honeywords

S Palaniappan, V Parthipan… - Proceeding of the …, 2020 - Springer
The purpose of the password is to protect the user account from unauthorized usage by the
hacker. But in the current situation the field of security also realizes lot of threat to the …

Strengthening password security through honeyword and Honeyencryption technique

VR Pagar, RG Pise - … Conference on Trends in Electronics and …, 2017 - ieeexplore.ieee.org
In digital era people's livelihood is completely depend on internet due to speedy growth of it.
Web services are widely used by business, government, individuals. Communication with …

Identification and detecting of attacker in a purchase portal using honeywords

J Brindtha, KR Hithaeishini, R Komala… - 2017 Third …, 2017 - ieeexplore.ieee.org
Honeywords are originated by the user details given and the authenticated password is
changed to another format and saved with honeywords. We deploy intermediate server …

Implementation of honeywords as a codeigniter library for a solution to password-cracking detection

AB Kusuma, YR Pramadi - IOP Conference Series: Materials …, 2019 - iopscience.iop.org
Stolen files of password hashes is a common threat to web-based authentication. The
password hashes can be cracked with new methods that are considered faster and easier …

Improved hashing and honey-based stronger password prevention against brute force attack

KSM Moe, T Win - … on Electronics and Smart Devices (ISESD), 2017 - ieeexplore.ieee.org
Nowadays, security of password file is one of the most important problems for millions of
users and companies in various fields. So, many systems store the password files in …

[PDF][PDF] Securing System using Honeyword and MAC Address

H Ghare - Int J Res Appl Sci Eng Technol, 2019 - academia.edu
To overcome the problem of online transaction fraud, introducing a honeyword mechanism
to detect an adversary who attempts to log in with cracked passwords. A new password is a …

Securing password in static password-based authentication: A review

IA Mohamedali, Y Fadlalla - 2017 Sudan Conference on …, 2017 - ieeexplore.ieee.org
Authentication is the process of verifying credentials provided by a user against stored ones
to ensure that the claimer is who s/he says they are [1]. Securing user's input is vital to …