论文标题
Bernoulli Honeywords
Bernoulli honeywords
论文作者
论文摘要
在凭证数据库中种植的诱饵密码或“ honeywords”,如果尝试在登录尝试中提交,则可以提醒网站漏洞。为了有效,某些Honeyword必须至少看起来是用户选择的密码与真实密码一样的可能性,而honeywords在不违反数据库的情况下必须很难猜测,以防止错误的漏洞警报。但是,对于启发式HoneyWord Generation算法,这些目标被证明是难以捉摸的。在本文中,我们探讨了一种替代策略,其中辩护人将honeyword选择视为伯努利过程,其中每个可能的密码(除用户选择的密码除外)被选为具有固定概率的蜂蜜字。我们展示了如何将Bernoulli Honeywords集成到两个现有的系统设计中,以利用HoneyWords:基于一个Honeychecker,该单词将用户选择密码的秘密索引存储在帐户密码列表中,而另一种根本不利用秘密状态。我们表明,Bernoulli Honeywords可以对错误的突破检测概率进行分析推导,而与攻击者收集到网站用户的哪些信息无关;他们的真实和虚假的违规检测概率表明了令人信服的功效。而且,伯努利(Bernoulli)honeywords甚至可以在现代Honeyword系统设计中进行性能改进。
Decoy passwords, or "honeywords," planted in a credential database can alert a site to its breach if ever submitted in a login attempt. To be effective, some honeywords must appear at least as likely to be user-chosen passwords as the real ones, and honeywords must be very difficult to guess without having breached the database, to prevent false breach alarms. These goals have proved elusive, however, for heuristic honeyword generation algorithms. In this paper we explore an alternative strategy in which the defender treats honeyword selection as a Bernoulli process in which each possible password (except the user-chosen one) is selected as a honeyword independently with some fixed probability. We show how Bernoulli honeywords can be integrated into two existing system designs for leveraging honeywords: one based on a honeychecker that stores the secret index of the user-chosen password in the list of account passwords, and another that does not leverage secret state at all. We show that Bernoulli honeywords enable analytic derivation of false breach-detection probabilities irrespective of what information the attacker gathers about the sites' users; that their true and false breach-detection probabilities demonstrate compelling efficacy; and that Bernoulli honeywords can even enable performance improvements in modern honeyword system designs.