2. Literature review
The current study is based on the work of Juels and Rivest published in
2013. In their work, Juels and Rivest (2013) for the first time propose
honeywords as the way to make password cracking detectable. The idea itself is controversial
and has a lot of weak points. To represent critical point of view, the work of
Wang et al. (2017) is also used in the research.
Juels and Rivest introduced an idea and described the way it can be implemented
in the current industry. They had described the way honeywords could be stored
and the way they could be generated and analysed. However, generating of honeywords
presented in their work is widely criticised. As an example of such critique is
the work of Wang et al. where the detailed analysis of honeyword
generation techniques is given. Moreover, it is concluded that current
generation techniques are raw and inefficient.
Secondly, experimenting with modern machine learning based password
crackers in order to assess the efficiency of honeywords is presented by Wang et al. (2017). The results of the
experiments show that in 29.29 – 32.62% of cases basic trawling-guessing
attacker was able to identify the honeyword. With advanced attacker that number
increased to 34.21 – 49.02% of cases. However, the number is increased towards
56.81 – 67.98% if the attacker possesses personal information about the victim.
One of conclusions is that user behaviour connected with using personal
information in passwords is completely vulnerable since personal information
can be easily found on social networks.
To conclude, sources that are used in the current study provide critical
analysis of honeywords, show a number of weak points and give the field for
further research, especially in the field of honeywords generation. However,
both sources suggest that honeywords are not yet ready to be implemented in the
modern industry and services.
Reference:
Wang, D. et al. (2017) ‘A Security Analysis of Honeywords’, in. NDSS 2018, San Diego, USA: ReaserchGate. Available from: https://www.researchgate.net/publication/320626726_A_Security_Analysis_of_Honeywords.
Juels, A. and Rivest, R.L. (2013) ‘Honeywords: making password-cracking detectable’, in. CCS, Berlin, Germany: ACM, pp. 145–160. Available from: https://dl.acm.org/doi/abs/10.1145/2508859.2516671?casa_token=z0BT8j2R23UAAAAA:rWbGmGVWkVHKWKFF4USMBi0I8uIyQqJtHioVEPnIGUqiPR4nPE-jmn665OBxEUVr3UrzZfDo7isQ#sec-ref.
The Literature Review should be a collection of research (as you have here) but think about the structure and try to make it flow more as a cohesive piece of writing.
ReplyDelete