SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 4, May-June 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 827
Detection of Attacker using Honeywords
Senthilnayaki B1
, Mahalakshmi G1
, Dharanyadevi P2
, Narashiman D1
1
Department of Information Science and Technology, CEG, Anna University, Chennai, Tamil Nadu, India
2
Department of CSE, Puducherry Technological University, Pillaichavadi, Puducherry, India
ABSTRACT
With the growth of the Internet, there has been a tremendous increase
in the number of attacks, and therefore intrusion detection systems
(IDS’s) have become a mainstay of information security. The
purpose of IDS is to help the computer systems deal with attacks.
This anomaly detection system creates a database of normal
behaviour and deviations from normal behaviour to trigger events
during the occurrence of intrusions. Based on the source of data, IDS
are classified into host-based IDS and network-based IDS. The
proposed work is to validate the correct user or attacker. The system
is identified as an abnormal user. An alert will be sent to the
authorised user. The proposed system is to supply the fake
information to the attacker by using the honeywords technique. A
new system is proposed to secure content from various unauthorised
users.
KEYWORDS: Honeywords, Security, Password, Hash Function,
Authentication, Attacker
How to cite this paper: Senthilnayaki B |
Mahalakshmi G | Dharanyadevi P |
Narashiman D "Detection of Attacker
using Honeywords"
Published in
International Journal
of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-6 |
Issue-4, June 2022, pp.827-831, URL:
www.ijtsrd.com/papers/ijtsrd50074.pdf
Copyright © 2022 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
Network security provides the policies and techniques
used to prevent and monitor illegal access, abuse,
modification, or denial of a computer network. The
network administrator controls network security,
which entails the permission of access to data on the
network. Users select or are granted an ID, password,
or other type of authentication that gives them access
to information and applications under their control.
Network security refers to a wide range of public and
private computer networks that are utilised in
everyday tasks such as completing transactions and
communications between organizations, government
agencies, and individuals. Hence, it concerns security
for accessing the data from organizations,
corporations, and other sorts of institutions. It secures
the network while also safeguarding and managing
activities. Assigning a unique name and password to a
network resource is the most popular and
straightforward method of safeguarding it.
Honeyword
Honeywords are phoney passwords that are kept
together with actual passwords and are linked to each
user's account. When an attacker obtains the
password list, he or she retrieves a large number of
password candidates for each account, and the
intruder has no way of knowing which one is correct.
As a result, if an intruder attempts to log in using a
honeyword, the cracked password files can be
discovered by the system administrator. Exposure of
passwords is a serious security issue that has
prompted a huge number of users and organizations,
including Yahoo, Rock You, LinkedIn, eHarmony,
and Adobe, to take action. One way of detecting the
existence of a password database breach is to use a
honeypot.
The administrator establishes fake user accounts on
purpose to catch intruders and detects a password leak
if any of the honeypot credentials are utilized.
Making password hashing more complicated and
time-consuming is another way to improve the
problem. For each account, the Honeyword technique
involves having many possible passwords, only one
of which is correct. The false page is used to give the
hacker the impression of accessing the original data.
This decoy page is a fake page that the hacker
accesses as if it were the real thing. Also, when the
IJTSRD50074
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 828
hacker accesses the fake website, the legitimate user
will quickly notice through warnings that an
unauthorised user is attempting to access the page.
Using the honeywords technique, a novel system is
constructed in this paper. The system's basic concept
may be utilised as a platform in institutes, businesses,
and anywhere else where credential data is protected
by a password. It also aids in the monitoring of
administrative procedures and the evaluation of
performance in order to make improvements. This
system takes advantage of services like notification,
which increases the system's overall efficiency and
customer happiness.
LITERATURE SURVEY
Imran (2016) provided a new honeyword generating
method, which produces better results in terms of
flatness. When honeywords are appropriately chosen,
a cyber-attacker who bargains a file of hashed
passwords has no way of knowing whether the
password is the real one or a honeyword for any
account. Senthilnayaki et al. (2015) studied several
forms of network system attacks and classified them
using multiple classifications.
Rivest (2013) developed a way of making hashed
passwords more secure. Honeywords must be
generated for each user account to increase security.
When an attacker acquires a file of hashed passwords
and inverts the hash function, the author has no way
of knowing whether they have discovered the
password or a honeyword. With developments in
graphics processing unit (GPU) technology, Kardas et
al. (2013) suggested a way to crack a password hash
significantly simpler. No server can detect any
unauthorised user authentication once the password
has been obtained.
Malone and Maher (2012) investigate how passwords
are chosen and shared. In lists of chosen terms, Zipf's
Law is commonly found. The authors analyse if Zipf's
law is a viable contender for characterising the
frequency with which passwords are chosen using
password lists from four different online sources.
Komal et al. (2016) employed the honeywords
approach to protect against assaults by unauthorized
insiders, preventing them from discerning between
genuine sensitive customer data and useless data.
Senthilnayaki and colleagues (2021), In this article,
authors simulated Ad Hoc On-Demand Distance
Vector networks and examined the impact of different
assaults on the network, including wormhole, black
hole, and flooding attacks. Researchers are employed
WEKA as data mining tools for analysis, which let us
retrieve transmitted, received, and discarded packet
information in the networks under assault.
Manisha (2015) suggested the Chaffing-With-
Tweaking method. The user password is used to seed
the generating algorithm, which then changes chosen
character locations of the genuine password to
generate honeywords. When irregular information
access is identified, Dipali and Shyam (2014)
provided a method for assessing whether data access
is permitted or not. Providing false information to the
attacker. This guards against the abuse of the users'
personal information. Senthilnayaki et al (2015)
reviewed different types of attacks affected in
network system and provides various classification to
classifies. Sethilnayaki et al (2021) provides the
anomaly detection system creates a database of usual
behavior and deviations from it, which it utilizes to
trigger intrusion detection when it happens. Based on
the data source, the IDS model is separated into two
types: hostbased IDS and network-based IDS.
Honeywords are generated using a variety of current
honeyword creation techniques. As a result, every
attempted login puts the attacker at danger of being
identified. The attacker will also be noticed if they
use a brute force approach.
PROPOSED SYSTEM ARCHITECTURE
The system architecture of the proposed work is shown in Figure 1. It consists of various modules, namely user
registration module, honey words generation module, cloud storage, authentication checking, and alert
generation.
Figure 1 Unauthorized User System Architecture
User
Registration
Password &
Honeywords Module
Cloud
Storage
Authorized
User
Unauthorized User
Generate Alert
Authentication
Checking
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 829
In this proposed work, first create a user profile using
the registration module and then generate the user
account. Using this information, the registered users
can access the data from the database server. Using an
existing user account, the system is allowed to access
organisational network data. Hence, they are allowed
to access their application using the correct login
account message. However, the server responds to the
end user query based on the authorised users' request.
The database server contains username, password,
questions and answers with personal information. The
authentication checking module is used to check for a
legitimate user or a decoy user. The system is
detected by an authorised user, then they are allowed
to access the organisational database. Else, the user is
allowed to access fake pages and this information is
sent to the admin.
Honeyword Checker
The proposed is to create the module called
"authentication checking" here to check and allow
correct information on user pages with the help of
honeywords. Using honeychecker is to collect
hardened systems where the information is stored in
secret. The detection of anomalies in the system
should have lots of experimentation done by using
honeychecker. Once the checker detects the anomaly,
it generates an alert message and sends it to an
administrator or other authorised person. After
sending the silent alert to the correct user, the checker
continues the system work. Later, the checker acts as
a login monitoring system and tracks the processed
operation.
Honeyword Generation Algorithm
Password files contain a number of security issues
that have impacted millions of individuals and
businesses. If a password file is stolen or stolen, it is
straightforward to capture most of the plaintext and
encrypt passwords using password cracking tools and
decryption procedures. So we used honey word
creations in this proposed module. That is, the user's
password and registered questions are merged, and a
key with the name "unknown" is generated.
Honey Word Generator:
Step1: Get the position po of the input and password
pa.
Step2: reverse the order of the password.
Step3: From 1 to 20, repeat the following steps.
Step4: If each position po corresponds to the
checking value,
With pa, assign a real password.
Create a new hash password.
Step5: Otherwise, use the real password as the
replacement password.
Step6: Create a new hash password
Step7: The password is a hashmap
Step8: Retrieve the password result
The general flow of the algorithm is
1. Receive string input of password
2. Determine the string's category or categories.
3. Choose the number of buckets
4. Fill bucket with chaff after placing password in it.
5. Fill the remaining buckets with chaff from the
respective strategy.
6. Shuffle the set of honeywords and locate the
password.
7. return the honeyword set and the sugarword index
EXPERIMENTATION RESULTS
This section explains the implementation details of
the proposed work. The experimental has been done
in Java using NetBeans. First, the hacker detection
proposed system is a registration page. On the
registration page, you must enter your name, user
name, email address, password, confirm password,
contact number, and address. The user must register if
they are not already a registered user. Figure 2 shows
the registration page for the user.
Figure 2 User Registration Form
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 830
The system collects the page for the planned
honeyword generation procedure. All of them include
inquiries, such as phone model, mother's name, and
school name. People have a pet name, a favorite
colour, favorite food, favorite drink, a nickname, a
favorite season, and a favorite place. The replies to
these questions form the basis of the honeyword
production process. After that, go to the legal page by
logging in with the right username and password. If a
phoney user tries to view the page, the task is
delegated to a fake page. Finally, the authorized user
receives the alert message. This shows how the
system handles notifications. An alarm will ring if the
honeywords are typed incorrectly more than three
times, informing the original user of the password
breach. It will take them to a fake website that looks
just like the real one. That page will keep track of
them and provide the original user with the updated
information. Figure 3 gives the email message to the
authorized person.
Figure 3 Email Notification Message
The comparison clarifies the distinctions between the
present and existing systems. It describes the aspects
of the proposed system as well as its performance
characteristics. Table 1 compares the features of the
existing and proposed systems.
Table 1 Comparison of Existing and Proposed
Systems
PARAMET ER
EXISTING
SYSTEM
PROPOSED
SYSTEM
Notification Absent Using email
ip detection Absent Present
Record Activities Absent Present
Speed of performance
evolution
slow Fast
The present system lacks feature such as notification,
IP detection, and activity recording, but the proposed
system does. It sends out alert notifications through
email. Performance is evolving at a faster rate than
the current system. As a consequence, the suggested
system outperforms the current system significantly.
CONCLUSION
The honeywords technique is used to create a new
system in this proposed work. The system's basic
concept may be utilised as a platform in institutes,
businesses, and anywhere else where credential data
is protected by a password. It also aids in the
monitoring of administrative procedures and the
evaluation of performance in order to make decisions
for improvement. This system takes advantage of
services like notification, which increases the
system's overall efficiency and customer happiness.
In the future, this work will be extended to include
better notification techniques.
References
[1] Imran Erguler, (2016). ‘Achieving Flatness:
Selecting the Honeywords from Existing User
Passwords’, IEEE Transactions on Dependable
and Secure Computing, vol. 13, no. 2, pp. 284-
295.
[2] Senthilnayaki B, G. Mahalakshmi,
Duraimurugan, Anbarasi N and Prasath Kumar,
“Intrusion Detection Using Information Gain
Feature Selection and Classification",
International Research Journal of Humanities
and Interdisciplinary Studies, vol 2. no 11, pp
155-166, 2021.
[3] R. L. Rivest and Juels, (2013). ‘Honeywords:
Making password cracking detectable’, in
ACM SIGSAC conference on Computer &
communications security, pp. 145-159.
[4] GenKardas, S and Kiraz, M. S. (2013).
‘Examination of a New Defense Mechanism:
Honeywords’. IACR Cryptology ePrint
Archive, pp. 690-696.
[5] D. Malone and K. Maher. (2012).
‘Investigating the Distribution of Password
Choices’, in ACM 21st International
Conference on World Wide Web, pp. 301-310.
[6] Ms.Komal Naik, Varsha Bhosale and Vinayak
D.Shinde. (2016). ‘Generating Honeywords
from Real Passwords with Decoy Mechanism’.
International Journal for Research in
Engineering Application & Management. Vol.
2, no.4, pp. 1-7.
[7] Senthilnayaki, B., Chandralekha, M and
Venkatalakshmi, K, “Survey of data mining
technique used for intrusion detection”,
International Journal of Technology and
Engineering System, vol.7, no 2, pp.166-171,
2015.
[8] Senthilnayaki, B, Anbarasi, N., Mahalakshmi,
G and Duraimurugan, J, (2021). IoT: Analysis
of Various Attacks Using AODV Protocol.
International Journal of Progressive Research in
Science and Engineering, 2(11), 29-32, 2021.
[9] Manisha Jagannath Bhole. (2015).
‘Honeywords: A New Approach For Enhancing
Security’. International Research Journal of
Engineering and Technology (IRJET). Vol.2,
no. 8, pp. 1563-1566.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 831
[10] Dipali Dhumal, Shyam Gupta. (2015).
‘Effective Approach to Detection of Password
File Using Honeywords’. International Journal
of Science and Research (IJSR). vol. 4, no. 12,
pp. 930-932.
[11] Balakrishnan, S., Venkatalakshmi, K., &
Kannan, A. (2014). Intrusion detection system
using feature selection and classification
technique. International journal of computer
science and application, 3(4), 145-151.
[12] F. Cohen. (2006). ‘The use of deception
techniques: Honeypots and decoys’. Handbook
on Information Security, vol. 3, pp. 646–655.
[13] Senthilnayaki, B., Venkatalakshmi, K., &
Kannan, A. (2019). Intrusion detection system
using fuzzy rough set feature selection and
modified KNN classifier. Int. Arab J. Inf.
Technol., 16(4), 746-753.

More Related Content

PDF
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
PDF
Honeywords for Password Security and Management
PDF
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
PPTX
Presentation 3 1 1 1
PDF
Encountering social engineering activities with a novel honeypot mechanism
PDF
IRJET - Secure Banking Application with Image and GPS Location
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Honeywords for Password Security and Management
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Presentation 3 1 1 1
Encountering social engineering activities with a novel honeypot mechanism
IRJET - Secure Banking Application with Image and GPS Location

Similar to Detection of Attacker using Honeywords (20)

DOCX
Achieving flatness selecting the honeywords
PDF
Analytical Study on Network Security Breach’s
PDF
IRJET- Honeywords: A New Approach for Enhancing Security
PDF
M0704071074
PDF
Integrated honeypot
PDF
Network Security Using IDS, IPS & Honeypot
PPTX
System Security
PDF
IRJET- A Review on Honeypots
PDF
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
PDF
Modern Attack Detection using Intelligent Honeypot
PPTX
05-Authentication.pptx Software Security
PDF
Intrusion Detection System using Data Mining
PDF
Honey words
PDF
Cs8792 cns - unit v
PDF
Honeypot- An Overview
PDF
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
PDF
Deterring hacking strategies via
PDF
The use of honeynet to detect exploited systems (basic version)
PDF
Achieving flatness selecting the honeywords
Analytical Study on Network Security Breach’s
IRJET- Honeywords: A New Approach for Enhancing Security
M0704071074
Integrated honeypot
Network Security Using IDS, IPS & Honeypot
System Security
IRJET- A Review on Honeypots
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
Modern Attack Detection using Intelligent Honeypot
05-Authentication.pptx Software Security
Intrusion Detection System using Data Mining
Honey words
Cs8792 cns - unit v
Honeypot- An Overview
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
Deterring hacking strategies via
The use of honeynet to detect exploited systems (basic version)
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives
Ad

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
RMMM.pdf make it easy to upload and study
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Trump Administration's workforce development strategy
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction to Building Materials
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Computing-Curriculum for Schools in Ghana
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Paper A Mock Exam 9_ Attempt review.pdf.
RMMM.pdf make it easy to upload and study
Digestion and Absorption of Carbohydrates, Proteina and Fats
Indian roads congress 037 - 2012 Flexible pavement
Trump Administration's workforce development strategy
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction to Building Materials
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Hazard Identification & Risk Assessment .pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Computing-Curriculum for Schools in Ghana

Detection of Attacker using Honeywords

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 4, May-June 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 827 Detection of Attacker using Honeywords Senthilnayaki B1 , Mahalakshmi G1 , Dharanyadevi P2 , Narashiman D1 1 Department of Information Science and Technology, CEG, Anna University, Chennai, Tamil Nadu, India 2 Department of CSE, Puducherry Technological University, Pillaichavadi, Puducherry, India ABSTRACT With the growth of the Internet, there has been a tremendous increase in the number of attacks, and therefore intrusion detection systems (IDS’s) have become a mainstay of information security. The purpose of IDS is to help the computer systems deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from normal behaviour to trigger events during the occurrence of intrusions. Based on the source of data, IDS are classified into host-based IDS and network-based IDS. The proposed work is to validate the correct user or attacker. The system is identified as an abnormal user. An alert will be sent to the authorised user. The proposed system is to supply the fake information to the attacker by using the honeywords technique. A new system is proposed to secure content from various unauthorised users. KEYWORDS: Honeywords, Security, Password, Hash Function, Authentication, Attacker How to cite this paper: Senthilnayaki B | Mahalakshmi G | Dharanyadevi P | Narashiman D "Detection of Attacker using Honeywords" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-6 | Issue-4, June 2022, pp.827-831, URL: www.ijtsrd.com/papers/ijtsrd50074.pdf Copyright © 2022 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION Network security provides the policies and techniques used to prevent and monitor illegal access, abuse, modification, or denial of a computer network. The network administrator controls network security, which entails the permission of access to data on the network. Users select or are granted an ID, password, or other type of authentication that gives them access to information and applications under their control. Network security refers to a wide range of public and private computer networks that are utilised in everyday tasks such as completing transactions and communications between organizations, government agencies, and individuals. Hence, it concerns security for accessing the data from organizations, corporations, and other sorts of institutions. It secures the network while also safeguarding and managing activities. Assigning a unique name and password to a network resource is the most popular and straightforward method of safeguarding it. Honeyword Honeywords are phoney passwords that are kept together with actual passwords and are linked to each user's account. When an attacker obtains the password list, he or she retrieves a large number of password candidates for each account, and the intruder has no way of knowing which one is correct. As a result, if an intruder attempts to log in using a honeyword, the cracked password files can be discovered by the system administrator. Exposure of passwords is a serious security issue that has prompted a huge number of users and organizations, including Yahoo, Rock You, LinkedIn, eHarmony, and Adobe, to take action. One way of detecting the existence of a password database breach is to use a honeypot. The administrator establishes fake user accounts on purpose to catch intruders and detects a password leak if any of the honeypot credentials are utilized. Making password hashing more complicated and time-consuming is another way to improve the problem. For each account, the Honeyword technique involves having many possible passwords, only one of which is correct. The false page is used to give the hacker the impression of accessing the original data. This decoy page is a fake page that the hacker accesses as if it were the real thing. Also, when the IJTSRD50074
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 828 hacker accesses the fake website, the legitimate user will quickly notice through warnings that an unauthorised user is attempting to access the page. Using the honeywords technique, a novel system is constructed in this paper. The system's basic concept may be utilised as a platform in institutes, businesses, and anywhere else where credential data is protected by a password. It also aids in the monitoring of administrative procedures and the evaluation of performance in order to make improvements. This system takes advantage of services like notification, which increases the system's overall efficiency and customer happiness. LITERATURE SURVEY Imran (2016) provided a new honeyword generating method, which produces better results in terms of flatness. When honeywords are appropriately chosen, a cyber-attacker who bargains a file of hashed passwords has no way of knowing whether the password is the real one or a honeyword for any account. Senthilnayaki et al. (2015) studied several forms of network system attacks and classified them using multiple classifications. Rivest (2013) developed a way of making hashed passwords more secure. Honeywords must be generated for each user account to increase security. When an attacker acquires a file of hashed passwords and inverts the hash function, the author has no way of knowing whether they have discovered the password or a honeyword. With developments in graphics processing unit (GPU) technology, Kardas et al. (2013) suggested a way to crack a password hash significantly simpler. No server can detect any unauthorised user authentication once the password has been obtained. Malone and Maher (2012) investigate how passwords are chosen and shared. In lists of chosen terms, Zipf's Law is commonly found. The authors analyse if Zipf's law is a viable contender for characterising the frequency with which passwords are chosen using password lists from four different online sources. Komal et al. (2016) employed the honeywords approach to protect against assaults by unauthorized insiders, preventing them from discerning between genuine sensitive customer data and useless data. Senthilnayaki and colleagues (2021), In this article, authors simulated Ad Hoc On-Demand Distance Vector networks and examined the impact of different assaults on the network, including wormhole, black hole, and flooding attacks. Researchers are employed WEKA as data mining tools for analysis, which let us retrieve transmitted, received, and discarded packet information in the networks under assault. Manisha (2015) suggested the Chaffing-With- Tweaking method. The user password is used to seed the generating algorithm, which then changes chosen character locations of the genuine password to generate honeywords. When irregular information access is identified, Dipali and Shyam (2014) provided a method for assessing whether data access is permitted or not. Providing false information to the attacker. This guards against the abuse of the users' personal information. Senthilnayaki et al (2015) reviewed different types of attacks affected in network system and provides various classification to classifies. Sethilnayaki et al (2021) provides the anomaly detection system creates a database of usual behavior and deviations from it, which it utilizes to trigger intrusion detection when it happens. Based on the data source, the IDS model is separated into two types: hostbased IDS and network-based IDS. Honeywords are generated using a variety of current honeyword creation techniques. As a result, every attempted login puts the attacker at danger of being identified. The attacker will also be noticed if they use a brute force approach. PROPOSED SYSTEM ARCHITECTURE The system architecture of the proposed work is shown in Figure 1. It consists of various modules, namely user registration module, honey words generation module, cloud storage, authentication checking, and alert generation. Figure 1 Unauthorized User System Architecture User Registration Password & Honeywords Module Cloud Storage Authorized User Unauthorized User Generate Alert Authentication Checking
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 829 In this proposed work, first create a user profile using the registration module and then generate the user account. Using this information, the registered users can access the data from the database server. Using an existing user account, the system is allowed to access organisational network data. Hence, they are allowed to access their application using the correct login account message. However, the server responds to the end user query based on the authorised users' request. The database server contains username, password, questions and answers with personal information. The authentication checking module is used to check for a legitimate user or a decoy user. The system is detected by an authorised user, then they are allowed to access the organisational database. Else, the user is allowed to access fake pages and this information is sent to the admin. Honeyword Checker The proposed is to create the module called "authentication checking" here to check and allow correct information on user pages with the help of honeywords. Using honeychecker is to collect hardened systems where the information is stored in secret. The detection of anomalies in the system should have lots of experimentation done by using honeychecker. Once the checker detects the anomaly, it generates an alert message and sends it to an administrator or other authorised person. After sending the silent alert to the correct user, the checker continues the system work. Later, the checker acts as a login monitoring system and tracks the processed operation. Honeyword Generation Algorithm Password files contain a number of security issues that have impacted millions of individuals and businesses. If a password file is stolen or stolen, it is straightforward to capture most of the plaintext and encrypt passwords using password cracking tools and decryption procedures. So we used honey word creations in this proposed module. That is, the user's password and registered questions are merged, and a key with the name "unknown" is generated. Honey Word Generator: Step1: Get the position po of the input and password pa. Step2: reverse the order of the password. Step3: From 1 to 20, repeat the following steps. Step4: If each position po corresponds to the checking value, With pa, assign a real password. Create a new hash password. Step5: Otherwise, use the real password as the replacement password. Step6: Create a new hash password Step7: The password is a hashmap Step8: Retrieve the password result The general flow of the algorithm is 1. Receive string input of password 2. Determine the string's category or categories. 3. Choose the number of buckets 4. Fill bucket with chaff after placing password in it. 5. Fill the remaining buckets with chaff from the respective strategy. 6. Shuffle the set of honeywords and locate the password. 7. return the honeyword set and the sugarword index EXPERIMENTATION RESULTS This section explains the implementation details of the proposed work. The experimental has been done in Java using NetBeans. First, the hacker detection proposed system is a registration page. On the registration page, you must enter your name, user name, email address, password, confirm password, contact number, and address. The user must register if they are not already a registered user. Figure 2 shows the registration page for the user. Figure 2 User Registration Form
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 830 The system collects the page for the planned honeyword generation procedure. All of them include inquiries, such as phone model, mother's name, and school name. People have a pet name, a favorite colour, favorite food, favorite drink, a nickname, a favorite season, and a favorite place. The replies to these questions form the basis of the honeyword production process. After that, go to the legal page by logging in with the right username and password. If a phoney user tries to view the page, the task is delegated to a fake page. Finally, the authorized user receives the alert message. This shows how the system handles notifications. An alarm will ring if the honeywords are typed incorrectly more than three times, informing the original user of the password breach. It will take them to a fake website that looks just like the real one. That page will keep track of them and provide the original user with the updated information. Figure 3 gives the email message to the authorized person. Figure 3 Email Notification Message The comparison clarifies the distinctions between the present and existing systems. It describes the aspects of the proposed system as well as its performance characteristics. Table 1 compares the features of the existing and proposed systems. Table 1 Comparison of Existing and Proposed Systems PARAMET ER EXISTING SYSTEM PROPOSED SYSTEM Notification Absent Using email ip detection Absent Present Record Activities Absent Present Speed of performance evolution slow Fast The present system lacks feature such as notification, IP detection, and activity recording, but the proposed system does. It sends out alert notifications through email. Performance is evolving at a faster rate than the current system. As a consequence, the suggested system outperforms the current system significantly. CONCLUSION The honeywords technique is used to create a new system in this proposed work. The system's basic concept may be utilised as a platform in institutes, businesses, and anywhere else where credential data is protected by a password. It also aids in the monitoring of administrative procedures and the evaluation of performance in order to make decisions for improvement. This system takes advantage of services like notification, which increases the system's overall efficiency and customer happiness. In the future, this work will be extended to include better notification techniques. References [1] Imran Erguler, (2016). ‘Achieving Flatness: Selecting the Honeywords from Existing User Passwords’, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 284- 295. [2] Senthilnayaki B, G. Mahalakshmi, Duraimurugan, Anbarasi N and Prasath Kumar, “Intrusion Detection Using Information Gain Feature Selection and Classification", International Research Journal of Humanities and Interdisciplinary Studies, vol 2. no 11, pp 155-166, 2021. [3] R. L. Rivest and Juels, (2013). ‘Honeywords: Making password cracking detectable’, in ACM SIGSAC conference on Computer & communications security, pp. 145-159. [4] GenKardas, S and Kiraz, M. S. (2013). ‘Examination of a New Defense Mechanism: Honeywords’. IACR Cryptology ePrint Archive, pp. 690-696. [5] D. Malone and K. Maher. (2012). ‘Investigating the Distribution of Password Choices’, in ACM 21st International Conference on World Wide Web, pp. 301-310. [6] Ms.Komal Naik, Varsha Bhosale and Vinayak D.Shinde. (2016). ‘Generating Honeywords from Real Passwords with Decoy Mechanism’. International Journal for Research in Engineering Application & Management. Vol. 2, no.4, pp. 1-7. [7] Senthilnayaki, B., Chandralekha, M and Venkatalakshmi, K, “Survey of data mining technique used for intrusion detection”, International Journal of Technology and Engineering System, vol.7, no 2, pp.166-171, 2015. [8] Senthilnayaki, B, Anbarasi, N., Mahalakshmi, G and Duraimurugan, J, (2021). IoT: Analysis of Various Attacks Using AODV Protocol. International Journal of Progressive Research in Science and Engineering, 2(11), 29-32, 2021. [9] Manisha Jagannath Bhole. (2015). ‘Honeywords: A New Approach For Enhancing Security’. International Research Journal of Engineering and Technology (IRJET). Vol.2, no. 8, pp. 1563-1566.
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD50074 | Volume – 6 | Issue – 4 | May-June 2022 Page 831 [10] Dipali Dhumal, Shyam Gupta. (2015). ‘Effective Approach to Detection of Password File Using Honeywords’. International Journal of Science and Research (IJSR). vol. 4, no. 12, pp. 930-932. [11] Balakrishnan, S., Venkatalakshmi, K., & Kannan, A. (2014). Intrusion detection system using feature selection and classification technique. International journal of computer science and application, 3(4), 145-151. [12] F. Cohen. (2006). ‘The use of deception techniques: Honeypots and decoys’. Handbook on Information Security, vol. 3, pp. 646–655. [13] Senthilnayaki, B., Venkatalakshmi, K., & Kannan, A. (2019). Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier. Int. Arab J. Inf. Technol., 16(4), 746-753.