Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment | ||||
Nile Journal of Communication and Computer Science | ||||
Articles in Press, Accepted Manuscript, Available Online from 12 October 2023 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/njccs.2023.195938.1010 | ||||
View on SCiNiTO | ||||
Authors | ||||
Ageebee Silas FAKI; Musa Yusuf ; Ishaya Oluwasegun Adelaiye | ||||
Bingham University Faculty of Science and Technology Department of Computer Science KM 25 Keffi-Abuja Express Way | ||||
Abstract | ||||
The emergence of the pervasive device has made login details more vulnerable to unauthorized access and damage. This weakness is due to frequent changes in users of pervasive devices and the close affinity of many attackers. Most available models only prevent attackers from gaining access to user login details. This study proposed a model that both detects and reveals the attacker's identity using the strength of the Honey Encryption algorithm with the ability to build a randomized message encoding called a Distribution-Transforming Encoder (DTE). The proposed model has the capability of providing a guide to security operatives to track and arrest the suspected perpetrator. An evaluation of the model was carried out, which shows a 62% success in revealing attackers. A further examination of the model shows that 21% of the attackers could gain access through close affinity to login users. The findings of this study suggest that people close to each other tend to have similar login details, making them more susceptible to identity theft. The proposed algorithm is useful in preventing unauthorized access to sensitive information by identifying vulnerable groups and implementing appropriate security measures. | ||||
Keywords | ||||
Cryptography; Honey Encryption; Pervasive; Hackers; Security. Algorithm | ||||
Statistics Article View: 41 |
||||