Show simple item record

dc.contributor.advisorVargas Martin, Miguel
dc.contributor.authorYu, Fangyi
dc.date.accessioned2023-03-13T19:41:03Z
dc.date.available2023-03-13T19:41:03Z
dc.date.issued2022-12-01
dc.identifier.urihttps://hdl.handle.net/10155/1593
dc.description.abstractHoneywords are fictitious passwords inserted into databases in order to identify password breaches. Producing honeywords that are difficult to distinguish from actual passwords automatically is a time-consuming and sophisticated task, and the majority of existing research assumes that attackers have no knowledge about users, which is a flawed assumption. In this thesis, we introduce two honeyword generation techniques (HGT): Honey-GAN and Chunk-GPT3, which can generate honeywords resistant to trawling attacks and targeted attacks, respectively. In addition, we propose a trawling attack, termed as Normalized Top-SW, to imitate trawling attackers and further assess the resilience of HGTs to the attack. Furthermore, we propose two text similarity-based metrics to evaluate the indistinguishability of honeywords. We analyze our HGTs compared with the other two state-of-the-art HGTs quantitatively and qualitatively and demonstrate that our HGTs can produce honeywords that are substantially more difficult for attackers to distinguish, hence increasing the bar for attackers and accelerating the detection of password breaches.en
dc.description.sponsorshipUniversity of Ontario Institute of Technologyen
dc.language.isoenen
dc.subjectGenerative adversarial networksen
dc.subjectHoneywordsen
dc.subjectAuthenticationen
dc.subjectSecurity and privacyen
dc.subjectNatural language processingen
dc.titleRaising the bar for password crackers: improving the quality of honeywords with deep neural networksen
dc.typeThesisen
dc.degree.levelMaster of Science (MSc)en
dc.degree.disciplineComputer Scienceen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record