BHU Digital Repository

Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment

Show simple item record

dc.contributor.author FAKI, Silas
dc.contributor.author MUSA, Yusuf
dc.contributor.author ADELAIYE, Oluwasegun
dc.date.accessioned 2024-05-21T10:22:03Z
dc.date.available 2024-05-21T10:22:03Z
dc.date.issued 2023
dc.identifier.citation 11. Faki A.S, Yusuf M., Adelaiye O.I., (2023). Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment. Nile Journal of Communication and Computer Science, 5(1), pp.2-9. en_US
dc.identifier.issn 2995 2994
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/1259
dc.description.abstract The emergence of the pervasive device has made log-in details more vulnerable to unauthorized access and damage. This is due to frequent changes in users of pervasive devices and the close affinity of many attackers. Most models available only prevent attackers from gaining access to user login details. This study proposed a model that both detects and reveals the attacker's identity using the strength of the Honey Encryption algorithm with the ability to build a randomized message encoding called a Distribution-Transforming Encoder (DTE). The proposed model has the capability of providing a guide to security operatives to track and arrest the suspected perpetrator. An evaluation of the model was carried out which shows a 62% success of revealing attackers. A further examination of the model shows that 21% of the attackers could gain access through close affinity to log-in users. An extension of the proposed model can be achieved by improving the detection rate of the model. en_US
dc.description.sponsorship Self en_US
dc.language.iso en en_US
dc.publisher Nile Journal of Communication and Computer Science en_US
dc.relation.ispartofseries Vol 5;
dc.subject cryptography en_US
dc.subject Honey Encryption en_US
dc.subject pervasive en_US
dc.subject pervasive hackers en_US
dc.subject security en_US
dc.title Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BHUDR


Advanced Search

Browse

My Account