Technique to Thwart Brute-Force Attack : A Survey

Authors(2) :-Lijimol James, Dileesh E D

Most encryption techniques have one essential problem that is they are vulnerable to brute-force attacks. Techniques used to prevent brute force attacks are increasing password length, password complexity, limit login attempts, using captcha, two factor authentication etc. A new mechanism to prevent against brute-force attack was introduced and this mechanism is known as Deception Model. Deception-based security mechanisms focus on altering adversaries perception in a way that can confuse them and waste their time and resources. This technique exploit adversaries biases and present them with a plausible looking but fake data. This technique can be used to serve for encrypting e-mail messages, human-generated messages and documents that are stored at different platforms. This paper will offer an detailed study of the current situation of Deception Model.

Authors and Affiliations

Lijimol James
M. Tech Scholar, M Tech Scholar, Department of Computer Science and Engineering, GEC Idukki, Kerala, India
Dileesh E D
Assistant Professor, Department of Computer Science and Engineering, GEC Idukki, Kerala, India

Deception, Encryption, Brute force attack, Honey Encryption, Decoy messages, DTE, NLP, Conventional encryption, Deep Learning

  1. Ramesh Yegireddi, R Kiran Kumar “A survey on Conventional Encryption Algorithms of Cryptography” IEEE International Conference, 2016.
  2. Bercovitch M, Renford M, Hasson L, Shabtai A, Rokach L and Elovici Y (2011). “HoneyGen: An automated honeytokens generator”, in Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, IEEE, pp. 131–136.
  3. Imran Erguler “Achieving Flatness: Selecting the Honeywords from Existing User Passwords” IEEE Transactions on Dependable and Secure Computing, 2015
  4. H. J. Jo and J. W. Yoon, ‘‘A new countermeasure against brute-force attacks that use high performance computers for big data analysis,’’ Int. J. Distrib. Sensor Netw., vol. 11, no. 6, 2015, Art. no. 406915. doi: 10.1155/2015/406915.
  5. M. Beunardeau, H.Ferradi, R.Géraud, and D.Naccache, ‘‘Honeyencryption for language-robbing Shannon to pay turing?’’ in Proc. Int. Conf. Cryptol. Malaysia, Springer, 2016, pp. 127–144.
  6. K.Joo-Imand J.Yoon, ‘‘Honeychatting: “A novel instant messaging system robust to eavesdropping over communication,’’ in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), Mar. 2016, pp. 2184–2188. Accessed: Jan. 12, 2019.
  7. BenWhitham.2017. “Automating the Generation of Enticing Text Content for High-Interaction Honeyfiles”. In Proceedings of the 50th Hawaii International Conference on System Sciences.
  8. P. Karuna, H. Purohit, R. Ganesan, and S. Jajodia, ‘‘Generating hard to comprehend fake documents for defensive cyber deception,’’ IEEE Intell. Syst.,vol.33,no.5,pp.16–25,Oct.2018 doi:10.1109/mis.2018.2877277.
  9. Mok, E., Samsudin, A., & Tan, S.-F. (2017). “Implementing the honey encryption for securing public cloud data storage”. In In Proceedings of First International Conference on Computer Science and Engineering.
  10. Omolara,A.E.,Jantan,A.,Abiodun,O.I.,&Poston,H.E.(2018) “A novel approach for the adaptation of honey encryption to support natural language message” In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 1).
  11. Abiodun Esther Omolara, Aman Jantani, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad “A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems” IEEE Access 2019, Digital Object Identifier 10.1109/ACCESS.2019.2928359.

Publication Details

Published in : Volume 7 | Issue 1 | January-February 2020
Date of Publication : 2020-02-29
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 235-237
Manuscript Number : IJSRSET207139
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Lijimol James, Dileesh E D, " Technique to Thwart Brute-Force Attack : A Survey, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 7, Issue 1, pp.235-237, January-February-2020. Available at doi : https://doi.org/10.32628/IJSRSET207139      Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET207139

Article Preview