Single packet authorization is a technique that allows shielding a protected network service from an outside world. The protection is achieved by hiding the respective transport layer port until cryptographically protected packet received by another service authorizes port opening. The technique has a known weakness related to the key leakage. If secret key is known to the attacker, the shield can be removed by one message. The paper proposes to use a novel Honeykeys authorization scheme that is aimed at deceiving the attacker by storing decoy cryptographic keys on both server and client sides along with the actual keys. In such scheme, if keys are compromised it will not lead to the full-scale system compromise. In addition to that, Honeyk...
As society is dependent on digital world, the threat continues to rapidly increase. Every year new m...
Information security is a rising concern today in this era of the internet because of the rapid deve...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
peer reviewedWe combine two security mechanisms: using a Password-based Authenticated Key Establishm...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
The number of devices vulnerable to unauthorized cyber access has been increasing at an alarming rat...
Password-only authentication is one of the most popular secure mechanisms for real-world online appl...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
peer reviewedPassword-based authentication is a widespread method to access into systems, thus passw...
Now-a-days, organizations are becoming more and more dependent on their information systems due to t...
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet.\ud \u...
Firewalls, intrusion detection systems and other security measures are used to control unwanted acce...
peer reviewedIn 2013 Juels and Rivest introduced the Honeywords System, a password-based authenticat...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
As society is dependent on digital world, the threat continues to rapidly increase. Every year new m...
Information security is a rising concern today in this era of the internet because of the rapid deve...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
peer reviewedWe combine two security mechanisms: using a Password-based Authenticated Key Establishm...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
The number of devices vulnerable to unauthorized cyber access has been increasing at an alarming rat...
Password-only authentication is one of the most popular secure mechanisms for real-world online appl...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
peer reviewedPassword-based authentication is a widespread method to access into systems, thus passw...
Now-a-days, organizations are becoming more and more dependent on their information systems due to t...
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet.\ud \u...
Firewalls, intrusion detection systems and other security measures are used to control unwanted acce...
peer reviewedIn 2013 Juels and Rivest introduced the Honeywords System, a password-based authenticat...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
As society is dependent on digital world, the threat continues to rapidly increase. Every year new m...
Information security is a rising concern today in this era of the internet because of the rapid deve...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...