Honeywords, an Enhancing Password Security Mechanism: A Comprehensive Survey

Abstract

With the increasing computer usage, the increase in threats to digital systems has led to the need to protect these systems by proposed a new technology to protect the system against hackers. So, there was a need to protect users' passwords and provide them with reliability and security. So-called honey words were used, which are fake words that are combined with real passwords side by side in the authentication database. Honeywords are a popular technology in the digital world and are important for enhancing the security of users' real passwords and are considered a strong additional security layer. The advantage of this technology is that it detects attempts to access systems without authorization. This technology provides high protection that confuses the attacker between which words in the database are real and fake. This technology increases the difficulty and complexity of hacking by attackers and enhances system security. Furthermore, it provides an effective strategy to mitigate the risks associated with password breaches, including dictionary and brute force attacks, thus improving the overall system resilience. This paper offers a comprehensive survey of the honeywords and their generating algorithms. The paper can be used as user help to give proper and adequate information about this subject.

Country : Iraq

1 Shahad A. Saadullah2 Saja J. Mohammed

  1. Student, Dept. of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq
  2. Professor, Dept. of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 9, Issue 1, January 2025 pp. 134-142

doi.org/10.47001/IRJIET/2025.901017

References

  1. Belding, G. (2018, September 22). What Are Honeywords? Password Protection for Database Breaches. Security boulevard (Accessed 2025, jan, 3).
  2. Huang, Z., Bauer, L., & Reiter, M. K. (2023, September 19). The Impact of Exposed Passwords on Honeyword Efficacy. 33rd USENIX security symposium.
  3. Sawant, S., Saptal, P., Lokhande, K., Gadhave, K., & Kaur, R. (2018, April). Honeywords: Making Password Cracking Detectable. IJERAT.
  4. Naik, K., Bhosale, V., & Shinde, V. D. (2016, July 4). Generating Honeywords from Real Passwords with Decoy Mechanism. IJREEAM, 2.
  5. Pattabiraman, S., Soms, N., Poovanan, & Ramakrishna, S. (2020). Password Protection Using Honeywords. ICACCABT (Coimbatore).
  6. Thite, V., & Nighot, M. (2021, May 5). Honeyword for Security: A Review. IJASRET, 6.
  7. Gholap, R. T., & Bhale, N. L. (2018). A Survey of Honeywords Techniques for User Authentication Enhancement. IJARII, 4.
  8. Yasser, Y. A., Sadiq, A. T., & AlHamdani, W. (2022). Generating Honeyword Based on A Proposed Bees Algorithm. IJCCC, 4.
  9. Yasser, Y. A., Sadiq, A. T., & AlHamdani, W. (2023, April 1). Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm. BSJ, 20.
  10. Ahmed, M. A., & Akif, O. Z. (2023). Honeywords Generation Technique Based on Meerkat Clan Algorithm and WordNet. WJPS, 2.
  11. Yasser, Y. A., Sadiq, A. T., & AlHamdani, W. (2022, March 25). A Proposed Harmony Search Algorithm for Honeyword Generation. Advances in Human Computer Interaction.
  12. Bhole, M., & Patnaik, G. K. (2018). Managing Passwords Using Honeyword Detection System. JEPIR, 12.
  13. Tian, Y.-J., Li, L., Peng, H., Wang, D., & Yang, Y. (2023). Honeywords Generation Mechanism Based on Zero Divisor Graph Sequence. IEEE Transaction on Services Computing, 16.
  14. Akif, O. Z., Sabeeh, A. F., Rodgers, G. J., & Al-Raweshidy, H. S. (2019, November 3). Achieving Flatness: Honeywords Generation Method for Passwords Based on User Behaviours. IJACSA, 10.
  15. Dionysiou, A., Vassiliades, V., & Athanasopoulos, E. (2021). Generating Honeywords Using Representation Learning. ASIA CCS.
  16. Almuhanna, A., Alfaadhel, A., & Ara, A. (2022). Enhanced System for Securing Password Manager Using Honey Encryption. Conference of women in data science at prince Sultan University.
  17. Chakraborty, N., & Mondal, S. (2015). A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability. IEEE Conference Computer science cryptography and security.
  18. Gholap, R. T., & Bhale, N. L. (2018). A Survey of Honeywords Techniques for User Authentication Enhancement. IJARIIE, 4.
  19. Gadgil, A. A., Khatawkar, S. D., & Me, C. S. E. (2016). Enhancing Security in User Authentication through Honeyword. IJSRM, 4.
  20. Erguler, I. (2016). Achieving Flatness: Selecting the Honeywords from Existing User Passwords. IEEE Transaction on Dependable and Secure Computing, 13.
  21. Akshima, Changy, D., Goelz, A., Mishray, S., & Sanadhyax, S. K. (2018). Generation of Secure and Reliable Honeywords Preventing False Detection. IEEE Transaction on Dependable and Secure Computing.
  22. Iuorio, A. F. (2019). Understanding Optimizations and Measuring Performances of PBKDF2. 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication.
  23. Yasser, Y. A., Sadiq, A. T., & AlHamdani, W. (2022). A Scrutiny of Honeywords Generation Methods: Remarks on Strengths and Weakness Points. Cybernetics and Information Technologies, 22.