🕔 Call For Paper — Vol. 13 | Issue 5 | May 2026 | Deadline: 31-May-2026
Track Paper Submit Paper Home
📢 NOTICE
📢 Call for Papers — Volume 13, Issue 5 (May 2026) | Submission Deadline: May 31, 2026 | Rapid peer review: 2–3 days | Impact Factor: 7.37 (SJIF 2026)

Paper Details

📄 IJAERD-OJS-5901

Honeyword :Encryption Mechanism in Network Security

Author(s):Prof.P.S.Gaikwad, Aishwarya Sonavane, Jeevan Jena, Pushpa Varsha, Megha Koul
Institution:Computer Department, AISSMS IOIT
Published In:Vol. 4, Issue 12 — December 2017
Page No.:-
Domain:Engineering
Type:Research Paper
ISSN (Online):2348-4470
ISSN (Print):2348-6406
Abstract

Banking systems always needs escalated security solutions. In tradition websites security measures are verylow resulting easily hack able server systems. We are proposing a new All in One architecture that will guard ourbanking system from various attacks. Main security threats such as SQL injection attack, URL injection attack, cross sitescripting, brute force attack. We will build a system that will prevent all these type of attacks. Every time a hacker tries tolaunch any of these attacks our system will generate a log into database. Hacker will be banned for a certain of timeperiod.The honeywords concept is also elegant because any attacker who's able to steal a copy of a password database won'tknow if the information it contains is real or fake. "An adversary who steals a file of hashed passwords and inverts thehash function cannot tell if he has found the password or a honeyword," Jules and Rivets pointed out. "The attempted useof a honeyword for login sets off an alarm. An auxiliary server (the "honeychecker") can distinguish the user passwordfrom honeywords for the login routine and will set off an alarm if a honeyword is submitted."Our systems will have some unique features like user’s password will be stored in encrypted format as a honeyword. Thishoneyword is shared with admin. If hacker use honeyword directly then system will ban access of hacker. System iscomplete Banking solution. User can transfer money to other accounts and perform other transactions.

🗎 Download PDF 🏆 Get Certificate
🕮 How to Cite

Prof.P.S.Gaikwad, Aishwarya Sonavane, Jeevan Jena, Pushpa Varsha, Megha Koul, “Honeyword :Encryption Mechanism in Network Security”, International Journal of Advance Engineering and Research Development (IJAERD), Vol. 4, Issue 12, pp. -, December 2017.

Related Papers

📄 Submit Your Paper

Open Access • Peer Reviewed • CrossRef DOI
UGC Approved • Monthly Publication

Submit Now →
📅 Submission Deadline
31 May 2026
Vol. 13 | Issue 5
May 2026