4.1 Meaning of the findings
The research of the honeywords demonstrates that such technology is not
ready to be implemented today. Implementing honeywords today may lead to creating
some additional DDos vulnerabilities. Moreover, the increase in security may
not be essential in comparison with the losses of storage space.
4.2 Areas for further research
To conclude, some further research in honeyword technology is necessary to make it ready for implementation. The most important is to create a honeyword generating technique that would be capable of creating honeywords that are hard to distinguish from real passwords of a particular user. Without advanced generation technique, implementing of honeywords will make system vulnerable against DDos attacks. Such generation technique needs to be able to tweak itself for every user individually in order to eliminate the negative effect connected with using personal information in passwords. Although, current system of honeywords tend to be inefficient on practise, some of the ideas are worth researching such as separating the computer used for storing passwords from the computer that processes them.
These final areas you have identified could be potential discussion pieces in future posts. As well as exploring other avenues from your research and what it is you want to learn about now in relation to your main research project theme.
ReplyDelete