ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detection of Attacker using Honeywords

Journal: International Journal of Trend in Scientific Research and Development (Vol.6, No. 4)

Publication Date:

Authors : ;

Page : 827-831

Keywords : Honeywords; Security; Password; Hash Function; Authentication; Attacker;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

With the growth of the Internet, there has been a tremendous increase in the number of attacks, and therefore intrusion detection systems IDS's have become a mainstay of information security. The purpose of IDS is to help the computer systems deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from normal behaviour to trigger events during the occurrence of intrusions. Based on the source of data, IDS are classified into host based IDS and network based IDS. The proposed work is to validate the correct user or attacker. The system is identified as an abnormal user. An alert will be sent to the authorised user. The proposed system is to supply the fake information to the attacker by using the honeywords technique. A new system is proposed to secure content from various unauthorised users. Senthilnayaki B | Mahalakshmi G | Dharanyadevi P | Narashiman D "Detection of Attacker using Honeywords" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50074.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/50074/detection-of-attacker-using-honeywords/senthilnayaki-b

Last modified: 2022-08-13 16:04:33