Document 12913222

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
Examination of a New Defense Mechanism:Honeywords
Rohit Gujar#1,Rahul Dhumal#2,Shrinath Shelke#3,Pravin Hinge#4,Prof.Prashant Suryavanshi#5
#1234
Student of BE Computer
#5Asst.Prof(Computer Engg)
Savitribai Phule Pune University,
H.S.B.P.V.T.COE, Kashti, Shrigonda 414701, Ahemednagar.
Abstract- The decoy passwords i.e honey words to
detect attacks against hash password database.For
each user account the legitimate password stored in
form of honey words. If attacker Attack on password
i.e honey words it can not be sure it is real password
or honeyword.
It is much easier to crack a password hash
with the advancements in the graphical processing
unit(GPU) technology.Entering with a honeyword to
login will trigger an alarm notifying the administrator
about a password file breach.In this context a paper
for
improving
the
security
of
hashed
passwords.Roughly speaking, they propose an
approach for userauthentication, in which some false
passwords, i.e“honeywords”are added into a
password file, in order todetect impersonation. Their
solution includes an auxiliarysecure server called
“honeychecker” which can distinguisha user’s real
password among her honeywords and immediatelysets
off an alarm whenever a honeyword is used. Inthis
paper, we analyze the security of the proposal,
providesome possible improvements which are easy to
implementand introduce an enhanced model as a
solution to an open
KeywordsAuthentication,Honeywords,login,passwords,Security
user accounts tolure adversaries and detects a
password disclosure, ifany one of the honeyword
passwords get used.
In this paper it can be represented the
honeyword mechanismto detect an adversary who
attempts to login with cracked passwords.Basically,
for each username a setof sweetwords is constructed
such that only one elementis the correct password and
the others are honeywords(decoy passwords). Hence,
when an adversary tries toenter into the system with a
honeyword, an alarm istriggered to notify the
administrator about a passwordleakage.
2.Check:i,j
Server
Honeyche
cker
3.True/False,Alarm
1.User send
login request
To server
4.ACCEPT/REJECT
User
I.INTRODUCTION
The password files is a severe securityproblem that
has affected by users,since leaked passwords make the
users target of many possible cyber-attacks.
In this paper there are two issues that should
be considered to overcome these security
problems:First passwords must be protected by taking
appropriate precautions and storing with their hash
values computed through salting or some other
complex mechanisms. Hence, for an adversary it must
be hard to invert hashesto acquire plaintext passwords.
The second point is that asecure system should detect
whether a password file disclosureincident happened
or not to take appropriate actions.In this study, we
focus on the latter issue and dealwith fake passwords
or accounts as a simple and costeffective solution to
detect compromise of passwords.
Honeyword is one of the methods to identify
occurrenceof a password database breach. In this
approach, theadministrator purposely creates deceit
ISSN: 2231-5381
Fig.1.Login schema of a system using
honeywords
When a user ui sends a login request, the loginserver
will determine the order of her among the users,and
the order of the submitted password among
hersweetwords. The login server sends a message of
theform Check(i, j) to a secure server which is
called“honeychecker”, for the ith user and her jth
sweetword.The honeychecker will determine whether
the submittedword is a password or a honeyword. If a
honeyword issubmitted, then it will raise an alarm or
take an actionthat is previously chosen Figure I. The
honeycheckercannot know anything about the user’s
password orhoneywords. It maintains a single
database that containsonly the order of the true
password among the user’ssweetwords.
In this study, we analyze the honeyword
approachand give some remarks about the security of
the system.Furthermore, we point out that the key item
for thismethod is the generation algorithm of the
http://www.ijettjournal.org
Page 201
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
honeywordssuch that they shall be indistinguishable
from the correctpasswords. Therefore, we propose a
new approachthat uses passwords of other users in the
system forhoneyword sets, i.e. realistic honeywords
are provided.
instance,mice3blind is decomposed as 4-letters + 1digit + 5-lettersL4+D1+L5 and replaced with the same
compositionlike gold5rings.
Bond004 james004
004bond 004004
2.HONEYWORDS
Set multiple possible password for each
account, any one of which is genuine.The others we
refer to as “honeywords.The attempted of a
honeywords to login in sets off an alarm,as an
adversarial attack has been reliably detected.Admin
login it require login id which is made up of various
sentence or word in each its last digit is a honeyword
assign key value store into the hash table called
“honeyword”.
2.1.3 Hybrid Method
It consists of combination of chaffing-with-apassword-model and chaffing-by-tweakingdigits.By
using this technique, random password modelwill
yield seeds for tweaking-digits to generate
honeywords.
3.SECURITY ANALYSIS OF
HONEYWORDS

2.1Honeyword Generation Methods
It is catagories into two groups first consists
of the legacy-UI(user interface) procedures and the
second one include modified-UI procedures whose
password-change UI is modified to allow better
password/honeyword generation.
Take-a-tail method is given as example of the
second category. Accordingto this approach a
randomly selected tail is produced forthe user to
append this suffix to her entered password and the
result becomes her new password. For instance,let a
user enter password games01, and then system
letpropose ’413’ as a tail. So the password of the user
nowbecomes games01413.
2.1.1 Chaffing-by-tweaking
In this method, the user password seeds the
generator algorithmwhich tweaks selected character
positions of thereal password to produce the
honeywords. For instance,each character of a user
password in predeterminedpositions is replaced by a
randomly chosen characterof the same type: digits are
replaced by digits, lettersby letters, and special
characters by special characters.Number of positions
to be tweaked, denoted as t should depend on system
policy.
2.1.2 Chaffing-with-a-password-model
In this approach, the generator algorithm
takes the passwordfrom the user and relying on a
probabilistic model
of real passwords it produces the honeywords.The
authors give the model of as an example for
thismethod named as the modeling syntax. In this
model,the password is splitted into character sets. For
ISSN: 2231-5381
Attack Model\
Brute-force attack
Guessing attack
Network monitoring
Phishing attack
Malwares
Visible passwords
1] Brute-force attack - An adversary can steal
thepassword hash file and crack the hashes using
bruteforce computation.He may also use a
precomputeddictionary of password hashes
2] Guessing attack - Many users choose weak
passwordssuch that an adversary can find out
thepasswords of some users of a system by
tryingcommon passwords while attempting to login to
thatsystem.Spafford suggest good passwordchoice
should avoid common words and names.
3]
Network monitoring - If the communication
between
the user and the system is unsecured, i.e.unencrypted,
an adversary may monitor the networktraffic and
obtain the passwords or interrupt the trafficwhile a
user creating her password and changeit to another
one [12]. This attack is also called man-in-the-middleattack
1.user sends login
record,
Request
request
User
2.Adversary may
modify,login
Adversary
Server
4.User sees what\ adversary sends. 5.Adv gets critical
info
Fig .2. Communication over an unsecured channel
http://www.ijettjournal.org
Page 202
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
4] Phishing attack - A user can submit her
logininformation to a web page prepared by an
adversarywhich seems very likely to the original
system’slogin screen.
5] Malwares - A Trojan program can capture the
keystrokes and send this information to the
adversaryThere are some advanced malwares that
cansteal the login information from messenger
likesoftwares some of which does not keep the
logininformation encrypted.
4.A NEW APPROACH
Our proposed model is still based on use of
honeywordsto detect password-cracking. However,
instead of generatingthe honeywords and storing them
in the passwordfile, we suggest to benefit from
existing passwords tosimulate honeywords.In order to
achieve this,for eachexisting password indexes,which
we call honeyindexes,are randomly assigned to a
newly created account, Moreover, a random
indexnumber is given to this account and hash of the
correctpassword is kept with the correct index in a list.
.It is equivalent to say that to
createuncertainty about the correct password, we
propose touse indexes that map to valid passwords in
the system.The contribution of our approach is
twofold. First, thismethod requires less storage
compared to the originalstudy. Second, in the previous
sections we argue thateffectiveness of the honeyword
system directly dependson how Gen() flatness is
provided and how it is closeto human behavior in
choosing passwords. Within our
approach passwords of other users are used as thefake
passwords, so guess of which password is fakeand
which is correct becomes more complicated for
anadversary.
4.1 Initilization
Firstly, T fake user accounts (honeypots) are
created
with their passwords.
TABLE1
Notation
H() Cryptographic hash function used to compute hash of the
passwords
Ui
Username for the ith user.
Pi
Password of the ith user
Wi
List of potential passwords for ui
Vi,j
Hash value of jth element of Wi
Vi
List of hash values for ui, Vi = (vi,1,vi,2…… vi,k)
k
Number of elements in Wi
ci
Index of the correct password in list Wi
Gen(k) Procedure used to generate Wi of length k of sweetwords
sweetword: Each element of Wi
sugarword: Correct password in Wi
honeyword: Each fake password of Wi
ISSN: 2231-5381
Also an index value between [1;N], but not used
previously is assigned to each honeypot randomly.
Then k =1 numbers are randomly selected from the
index list and for each account a honeyindex set is
built like Xi =(xi,1,xi,2,xi;k); one of the elements in
Xi is the correctindex (sugarindex) as ci. Now, we use
two passwordfiles as F1 and F2 in the main server: F1
stores usernameand honeyindex set, < hui,Xi >,where
hui denotes a honeypot account. Note that eachentry
has two elements. The first one is the usernameof the
account and the second element is honeyindexset for
the respective account. Also, the table is
sortedalphabetically by the username field. On the
other hand,F2 keeps the index number and the
corresponding hash of the password, < ci;H(pi) >, as
depicted in Table 3.In this case, each entry in the table
has two elements.
The first element is the sugarindex of the
account and thesecond one is the hash of the
corresponding password.Notice that the table is sorted
according to the indexvalues. Let SI denote the index
column and SH represent the corresponding password
hash column of F2. Thenthe function f(ci) that gives
password hash value in SH
User name
Rahul
Rohit
Shree
:
:
Pravin23
Prashant_m
Honeyindex Set
(23,2351,…….,6475)
(51432,15432,…….,88429)
(3,62107,……..,91233)
:
:
(1007,23471,……,47662)
(63,51234,……,72382)
TABLE 2
Example Password File F1 for the Proposed Model
SI
3
8
58
:
:
SH
H(p3)
H(p8)
H(p58)
:
:
10000
10003
H(p1000)
H(p10003)
TABLE 3
Example Password File F2 for the Proposed
Model
for the index value ci can be defined as: f(ci) = {H(pi)
toSH :< ci,H(pi) > stored pair of ui and ci to SI}.
Inorder to make points clear, the initialization process
isshown within the following example.
Example
1.Suppose
that
a
honeypot
username/password
pair is generated like <john,master2015> by
thesystem. Then an index number is randomly
selected, forinstance 1005, and assigned as the correct
http://www.ijettjournal.org
Page 203
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
index of thisaccount. Now F2 file is updated
according to this informationas shown below:
Index No Hash of Password
:
:
1005
:
:
H(master 2015)
Then, k =1 numbers are randomly chosen from SI of
F2 and
combined with correct index 1005 in a random
manner to
produce the index group. For instance, if k = 5, such a
group
(42,32104,1005,4201,34008) may be generated. In
this case
F1 file is seen as below:
Username Honeyindex Set
:
:
:
:
John
(42,32104,1005,4201,34008)
:
:
:
4.2 Registration
:
After the initialization process, system is ready for
user
registration. In this phase, a legacy-UI is preferred, i.e.
a username and password are required from the user
as ui,pi to register the system. We use the honeyindex
generator algorithm Gen(k,SI ) -> ci,Xi, which outputs
ci as the correct index for ui and the honeyindexes
Xi = (xi,1,xi,2…….xi,k).
4.4 Login Process
System firstly checks whether entered password, g,
iscorrect for the corresponding username ui. To
accomplishthis, firstly the Xi of the corresponding ui
is attained from the F1 file. Then, the hash values
stored inF2 file for the respective indices in Xi are
compared withH(g) to find a match. If a match is not
obtained, thenit means that g is neither the correct
password, nor oneof the honeywords, i.e. login fails.
On the other hand,if H(g) is found in the list, then the
main server checkswhether the account is a honeypot.
5.SECURITY ANALYSIS OF THE PROPOSED
MODEL
In this section, we investigate the security of the
proposed
model against some possible attack scenarios.Before,
however, we elaborate on the attack strategies,we will
first state a set of reasonable assumptions aboutour
approach and the related security policies. We
supposethat the adversary can invert most or many of
thepassword hashes in file F2. Notice that the
introductionof this scheme comes with a DoS attack
sensitivity inwhich an adversary deliberately tries to
login with honeywordsto trigger a false alarm. Hence,
the suggestedpolicies given below mostly focuses on
minimizing theDoS vulnerabilities.
when a user loginswith a wrong password,
but not a honeyword, thelogin fails. If this
wrong password is the passwordof another
account in the system and the sameuser hits
this situation more than once (trying
withother passwords in F2), the system
should turn onadditional logging of the user’s
activities to detect a possible DoS attack and
to attribute the adversary,besides the
incorrect login attempt case proceeds asusual.
4.3 Honeychecker
In our approach, the auxiliary service honeychecker is
employed to store correct indexes for each account
and
we assume that it communicates with the main server
through a secure channel in an authenticated manner.
The honeychecker executes two commands sent by
the main server:
Set: ci,ui
Sets correct password index ci for the user ui.
Check: ui,j
Checks whether ci for ui is equal to given j.
Returns the result and if equality does not
hold, notifies system a honeyword situation.
Thus, the honeychecker only knows the correct index
for a username, but not the password or hash of the
password.
ISSN: 2231-5381
If a password, whose hash value is in the SH
of the F2, is entered in wrong login attempts
for more than once, the system should take
actions against a possible DoS alarm. In this
case the system suspects about the respective
password such that it is known by the
adversary and she aims to raise a honeyword
situation. Resultantly, the consecutive wrong
login attempts with this password gives rise
to a DoS warning and further activities of the
user are investigated by the admin as a
precaution to prevent a false honeyword
alarm. Note that these attempts may be done
with a single username or with different
usernames.
In order to increase the number of unique
passwordsin the system, i.e. reduce common
passwords,users should be forced to adhere
to a passwordcompositionpolicy like basic8
http://www.ijettjournal.org
Page 204
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
(8 or more characters),comprehensive8 (at
least 8 characters, includingan uppercase and
lowercase letter, a symbol,and a digit and not
contain a dictionary word),basic16 (16 or
more characters) in the password creation.
The main reason behind this item isto
minimize the number of common passwords
in the system,if the numberof common
password increases, the chance of
anadversary realizing a DoS attack also
increases.
A username should not be correlated with its
password,the contribution of the honeywords
for an account,that has a correlated username
password pair, willbe weakened. Although
fulfilling this item is noteasy, some obvious
vulnerable cases can be automaticallyrejected
by the system by developing custom policy,
e.g.
the
password
string
involves
theusername as a suffix or prefix are not
accepted as a
pasword.
user will benegligibly low. Although, an adversary
may hit a realpassword using a common password in
the system, itis not necessarily a honeyword for the
correspondingaccount. Thus, use of real passwords as
honeywordsdoes not cause a DoS weakness.
6.3 Flatness
It demonstrates that the chaffing-withtweakingmodelmay leave traces to an adversary in
distinguishingthe genuine password from the
honeywords,the producedhoneywords may seem like
user passwords from theperspective of the
adversary.Success of the method inflatness depends
on how password-model is constructed,for instance
the
modeling
syntax
yields
honeywords
dependingcomposition of the user password, thereby
aperfect user like behaviour cannot be provided. On
theother hand, the simple model described in the
studymay satisfy the distribution of honeywords like
userpasswords by using a list of real passwords. For
ourproposed model as described previously passwords
ofother users become honeywords for a user.
Method
To avoid occurrence of a high number of
common passwords in the system, the user
should be driven to choose another password
when the created password is in the list of
1000 most common passwords. Hence,
chance of a possible DoS attack described
below will be reduced.
6.COMPARISON OF HONEYWORD
GENERATION MDELS
In this section consists of storage cost, dos
resistance, flatness, and usability to achieve target
goal.
6.1 Storage Cost
A typical passwordfile system requires hN
plus storage for usernames,where N stands for the
number of users in the systemand h denotes length of
password hash in bytes.On the other hand this is
khN,where k denotes the number of the sweetwords
assigned to each account.Notice that we ignored the
storage cost stemmed from usernames, since it is not
changed after adaptation of the honeywords.
6.2 Dos Resistance
In this we show that the chaffing-withtweakingmodelmay suffer from a DoS attack, due to
predictabilityof the honeywords. Unlikely, the
chaffing-with-a-passwordmodelprovides
resistance
against such an attack, becausehoneywords are
generated by using a list of passwords such that they
may be independent from the correctpassword
adaptation of a strong password compositionpolicy
likely prevents occurrence of common passwordsin
high numbers, i.e. probability of a common
passwordis assigned as a honeyword for a specific
ISSN: 2231-5381
Tweaking
Passwordmodel
Dos
Resistance
weak
strong
Flatness
weak
strong
Storage
Cost
hN*
khN
6.4 Usability
In this part, we compare our approach with
the simplemodel in terms of practicality and ease of
use. Byconsidering the simple model whose password
listis constructed with composition of numerous
realpasswords and randomly generated passwords, one
canargue about how the real password source is
provided.If the same resource of real passwords is
used indifferent sites, similar inherited weaknesses
related tohoneyword generation may be observed. By
weak DoS resistance we mean an adversarywho
knows the password can hit the one of
correspondinghoneywords with a non-negligible
chance; while bystrong we mean that this chance is
ignorably small.
7.CONCLUSION
In this study, we have analyzed the security of
thehoneyword system and addressed a number of
flawsthat need to be handled before successful
realization ofthe scheme. In this respect, we have
pointed out that thestrength of the honeyword system
directly depends onthe generation algorithm, i.e.
flatness of the generatoralgorithm determines the
chance of distinguishing the correct password out of
respective sweetwords.
Anotherpoint that we would like to stress is
that defined reactionpolicies in case of a honeyword
entrance can beexploited by an adversary to realize a
http://www.ijettjournal.org
Page 205
International Journal of Engineering Trends and Technology (IJETT) – Volume 27 Number 4 - September 2015
DoS attack. Thiswill be a serious threat if the chance
of an adversary inhitting a honeyword given the
respective password isnot negligible. To combat such
a problem, also knownas DoS resistance, low
probability of such an eventmust be guaranteed.
This
can
be
achieved
by
employingunpredictable honeywords or altering
system policy tominimize this risk. Hence, we have
noted that the securitypolicy should strike a balance
between DoS vulnerabilityand effectiveness of
honeywords.
In the future, we would like to refine our
model byinvolving hybrid generation algorithms to
also make thetotal hash inversion process harder for
an adversary ingetting the passwords in plaintext form
from a leakedpassword hash file. Hence, by
developing such methodsboth of two security
objectives – increasing the totaleffort in recovering
plaintext passwords from the hashedlists and detecting
the password disclosure – can beprovided at the same
time.
[14] D. Florencio and C. Herley, “A Large-scale Study of Web
Password Habits,” in Proceedings of the 16th international
conference on World Wide Web. ACM Press, 2007, pp. 657–666.
[15] A. Pathak, “An Analysis of Various Tools, Methods and
Systems
to Generate Fake Accounts for Social Media,” Ph.D. dissertation,
Northeastern University Boston, 2014.
[16] D. Nagamalai, B. C. Dhinakaran, and J. K. Lee, “An In-depth
Analysis of Spam and Spammers,” arXiv preprint arXiv:1012.1665,
2010.
[17] C. Biever, “Project Honeypot to Trap Spammers,” New
scientist,
no. 2485, p. 26, 2005.
REFERENCES
[1]Mathew L.Bringer , Christopher A. Chelmecki , Hiroshi Fujinoki
“A Survey:Recent Advances and Future Trends in Honeypot
Research” I.J. Computer Network and Information Security,2012.
[2]Gary Kelly,Diane Gan “Analysis of Attacks Using a Honeypot”
Springer-VerlagBerlinHeidelberg,2011.
[3] Deniz Akkaya-Fabien Thalgott “Honeypots in network securityA
Thesis”
LinnaeusUniversity.
[4] Spitzner, Lance. “Honeypots: Definitions and Value of
Honeypots”, May 2003, accessed: November 2012, URL:
http://www.trackinghackers. com/papers/honeypots.html.
[5]John P.John, Fang Yu, yinglian Xie, Arvind Krishnamurthy.
Martin Abadi “Heat-seeking Design and Experience” International
World Wide Web Conference Committee.2011.
[6] Feng zha g.Shiiie Zhou,Zinguang Oin Jinde Liu “A
supplemented active defense system for Honeypot network security”
IEEE.2003.
[7]Newsome J, Karp B, Song D. "Polygraph : Automatically
GeneratingSignatures for Polymorphic Worms." IEEE Symposium
on
Securityand
Privacy.
2005.
pp
226-241.
[8]Zhichun Li, Manan Sanghi, Yan Chen, Ming Yang Kao, Chavez
B."Hamsa : Fast Signature Generation for Zero Day
PolymorphicWorms with Provable Attach Resilience." IEEE
Symposium
onSecurity
and
Privacy.2006.pp15-47.
[9]Bimal Kumar Mishra and Dinesh Kumar Saini,”SEIRS epidemics
model with delay for transmission of malicious objects in computer
network”,Applied
Mathematics
and
Computation,Elsevier,188(2007).
[10]R.T. Goswami ,Avijit Mondal,Bimal Kumar Mishra and N.C.
Mahanti “Defending Polymorphic Worms in Computer Network
using Honeypot”International Journal of Advanced Computer
Science and Applications,Vol.3,No.10,2012
[11]P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas,
L. Bauer, N. Christin, L. F. Cranor, and J. Lopez, “Guess again
(and
gain and again): Measuring Password Strength by Simulating
Password-cracking Algorithms,” in Security and Privacy (SP), 2012
IEEE Symposium on. IEEE, 2012, pp. 523–537.
[12] J. Bonneau and S. Preibusch, “The Password Thicket:
Technical
and Market Failures in Human Authentication on the Web,” in
WEIS, 2010.
[13] G. Notoatmodjo and C. Thomborson, “Passwords and
Perceptions,”in Proceedings of the Seventh Australasian
Conference on Information Security–AISC 2009. Australian
Computer Society,
Inc., 2009, pp. 71–78.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 206
Download