Group Members Tanavi Dalavi Vishakha More Sonali Jadhav Guide Mrs. Vijaya Chavan
Jul 05, 2015
Group Members
Tanavi Dalavi
Vishakha More
Sonali Jadhav
GuideMrs. Vijaya Chavan
Existing System Contains User_Name and Password Based Method.
Threats To The Existing
System are :
Shoulder Keylogger Bots
Surfing
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation.
Key stroke are recorded
Threat to login system as
the username and
password recorded
BotsPerform simple and repetitive tasks
Text Based Password are subject to attacked by following ways
In shoulder surfing attacker can capture a password by direct observation
In key logger attacker record the individual’s authentication session.
In bots attack the automated or semi-automated robots do the same
Sensitive Information requires high security
Authentication processes to keep information secure
Authentication Methods
Graphical Image Based
Password Based Password
If password is “deokar”
A grid of image is displayed, where the user will select a particular images from the grid.
The aim of this authentication is to avoid attack from a script or another machine.
A keylogger or bot attack can be avoided.
HARDWARE:
Processor: Pentium-IV 1.5 GHz and above
Ram: 256 MB minimum
512 MB preferred
Monitor: 15 inch
CD-ROM: 52x speed
SOFTWARE:
Operating System: Microsoft Windows XP and above.
Software: JDK 1.5 and higher.
Websites:
www.ieeexplore.ieee.org
www.wikipedia.com
Book:
“Network Security-Overcome Password Hacking Through Graphical Password Authentication’’
M.ArunPrakash ,T.R.Gokul
Department of Information Technology, Tamil Nadu, India
“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:” A User Study Using Images for Authentication