Back to Search
Start Over
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey
- Source :
- ACM Computing Surveys. 55:1-37
- Publication Year :
- 2022
- Publisher :
- Association for Computing Machinery (ACM), 2022.
-
Abstract
- Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers’ efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.
- Subjects :
- General Computer Science
Theoretical Computer Science
Subjects
Details
- ISSN :
- 15577341 and 03600300
- Volume :
- 55
- Database :
- OpenAIRE
- Journal :
- ACM Computing Surveys
- Accession number :
- edsair.doi...........d0ae34470e654930bf38caa56946ecfb
- Full Text :
- https://doi.org/10.1145/3552431