Research Article
A Proposed Harmony Search Algorithm for Honeyword Generation
Table 3
A comparison in most pressing problems of honeyword systems.
| No. | Methods | Cond. flatness problem | Weak DoS resist. problem | Storage overhead problem | Corre. problem | Cons. and frequent numbers problem | Special date problem | User info. security problem |
| 1 | Proposed HSA | No | No | No | No | No | No | No | 2 | Chaffing-by-tail-tweaking [15] | Yes | Yes | No | Yes | Yes | Yes | No | 3 | Chaffing-by-tweaking-digits [15] | Yes | Yes | No | Yes | Yes | Yes | No | 4 | Simple model [15] | Yes | No | No | Yes | No | No | No | 5 | Modeling syntax [15] | Yes | No | No | Yes | Yes | Yes | No | 6 | Chaffing with “tough nuts” [15] | N/A | No | Yes | No | N/A | N/A | No | 7 | Take-a-tail [15] | No | No | No | No | No | No | No | 8 | Random pick [15] | Yes | No | No | Yes | No | No | No | 9 | Hybrid generation methods [15] | Yes | No | No | Yes | Yes | Yes | No | 10 | Storage-index [16] | Yes | Yes | Yes | Yes | No | No | No | 11 | PDP [17] | Yes | No | Yes | No | Yes | No | No | 12 | Evolving-password model [18] | Yes | No | No | Yes | Yes | Yes | No | 13 | User-profile model [18] | Yes | Yes | Yes | Yes | Yes | No | Yes | 14 | Append-secret model [18] | Yes | No | No | No | Yes | No | No | 15 | User information method [19] | Yes | Yes | Yes | Yes | Yes | No | Yes | 16 | Dictionary attack method [19] | Yes | Yes | No | Yes | No | No | No | 17 | Generic password list method [19] | Yes | No | No | Yes | No | No | No | 18 | Shuffling characters method [19] | Yes | Yes | No | Yes | Yes | Yes | No |
|
|