Decoy passwords, or ``honeywords,'' planted in a credential database can alert a site to its breach if ever submitted in a login attempt. To be effective, some honeywords must appear at least as likely to be user-chosen passwords as the real ones, and honeywords must be very difficult to guess without having breached the database, to prevent false breach alarms. These goals have proved elusive, however, for heuristic honeyword generation algorithms. In this paper we explore an alternative strategy in which the defender treats honeyword selection as a Bernoulli process in which each possible password (except the user-chosen one) is selected as a honeyword independently with some fixed probability. We show how Bernoulli honeywords can be integrated into two existing system designs for leveraging honeywords: one based on a honeychecker that stores the secret index of the user-chosen password in the list of account passwords, and another that does not leverage secret state at all. We show that Bernoulli honeywords enable analytic derivation of false breach-detection probabilities irrespective of what information the attacker gathers about the sites' users; that their true and false breach-detection probabilities demonstrate compelling efficacy; and that Bernoulli honeywords can even enable performance improvements in modern honeyword system designs.
翻译:假冒密码, 或“ honeywords ”, 或“ honeywords ”, 被植入一个身份证明数据库, 可以提醒某个网站, 如果在登录尝试中提交, 网站会被破坏。 为了有效, 一些蜂蜜字必须看起来至少与真实密码一样有可能是用户选择的密码, 而蜂蜜字必须非常难以猜测, 而不是破坏数据库, 以防止错误的破坏警报。 然而, 这些目标对于超优雅口令生成算法来说是难以实现的。 在本文中, 我们探索了一种替代战略, 维权者将蜂蜜字选择作为伯努利进程, 每一个可能的密码( 用户选择的一号除外) 都被选择为蜂蜜字, 并且具有一定的概率。 我们展示了如何将伯努利口令的密码秘密索引存储在账户密码列表中, 而另一个甚至不能利用现代状态。 我们显示, 贝努尔利的蜂蜜字可以让每个可能的密码( ) 独立选择一个蜂蜜密码( ) 蜂窝选择一个蜂窝选择一个), 蜂窝定义的错误定义的改进方法, 并显示其真实性破坏定义的稳定性, 。