Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
With the
increasing computer usage, the increase in threats to digital systems has led
to the need to protect these systems by proposed a new technology to protect
the system against hackers. So, there was a need to protect users' passwords
and provide them with reliability and security. So-called honey words were
used, which are fake words that are combined with real passwords side by side
in the authentication database. Honeywords are a popular technology in the
digital world and are important for enhancing the security of users' real
passwords and are considered a strong additional security layer. The advantage
of this technology is that it detects attempts to access systems without
authorization. This technology provides high protection that confuses the
attacker between which words in the database are real and fake. This technology
increases the difficulty and complexity of hacking by attackers and enhances
system security. Furthermore, it provides an effective strategy to mitigate the
risks associated with password breaches, including dictionary and brute force
attacks, thus improving the overall system resilience. This paper offers a
comprehensive survey of the honeywords and their generating algorithms. The
paper can be used as user help to give proper and adequate information about
this subject.
Country : Iraq
IRJIET, Volume 9, Issue 1, January 2025 pp. 134-142