A Straightforward Text-Based Shoulder Surfing Difficult, Graphical Code Word Plot

DOI : 10.17577/IJERTCONV2IS05084

Download Full-Text PDF Cite this Publication

Text Only Version

A Straightforward Text-Based Shoulder Surfing Difficult, Graphical Code Word Plot

,

G.SHAIK ABDULLAH1 B.MUTHULAKSHMI2, R.KANIMOZHI3

1Post Graduate Student, 2&3Assistant Professor 1&2Department of Computer Science and Engineering 3Department of Information Technology

A.V.C. College of Engineering Mayiladuthurai shaikit13@gmail.com1, kavithakamalan240101@gmail.com2, kanisoft22@yahoo.com3

Abstract – Shoulder surfing attack is a type of attack in which the password of the user can be taken by the movement of the shoulder when he enters his password. Normal password schemes can be easily attacked by the shoulder surfing sobrada and birget uses 3 sholder surfing resistant password schemes. After that many password schemes have been proposed. Generally most users are familiar with text based password Zhao proposed a text based graphical shoulder surfing password scheme. In this user has to use mixer of textual in login page. But in this login process is complex. After that many password schemes have been proposed. But No one is very efficient and secure. In this paper we use a text based graphical shoulder surfing resistant by using colors. This method is easy for the user to understand and to use. By use of this user can easily login without using any off screen or on screen keyboard.

Keywords – Shoulder surfing attack; Password Scheme

  1. INTRODUCTION

    A network is 2 or additional computers connected along so as to share knowledge. From a security stance, the matter with networks is that unauthorized people may additionally be able to access that knowledge. Network security could be a term that encompasses your overall system for keeping your network as impenetrable as doable, be it hardware, software, or company policies. Whether your network consists of 2 computers or

    200 computers, there are a unit bound basic security measures you ought to have in situ. Most of those measures are not sophisticated or pricy, and that they do not need any specific experience in networking or pc security. The shoulder surfriding attack in Associate in nursing attack that may be performed by the someone to get the users watchword by look over the users shoulder as he enters his watchword. As typical watchword schemes area unit prone to shoulder surfriding, Sobrado and Birget planned 3 shoulder surfriding resistant graphical watchword schemes. Since then,

    several graphical watchword schemes with totally different degrees of resistance to shoulder surfriding are proposed and every has its professionals and cons. seeing that the majority users area unit additional conversant in matter passwords than pure graphical passwords, Zhao et al. planned a text-based shoulder surfriding resistant graphical watchword theme, S3APS. In S3PAS, the user needs to combine his matter watchword on the login screen to induce the session watchword. However, the login method of Zhao et al.s theme is complicated and tedious. And then, many text primarily based shoulder surfriding resistant graphical watchword schemes are planned. Sadly, none of existing text-based shoulder surfriding resistant graphical watchword schemes is each secure and economical enough. During this paper, we are going to propose Associate in Nursing improved text-based shoulder surfriding resistant graphical watchword theme by victimization colors. The operation of the planned theme is straightforward and straightforward to be told for users conversant in matter passwords. The user will simply and with efficiency to login the system while not victimization any physical keyboard or on-screen keyboard.

  2. EXISTING SYSTEM

    Till currently we have a tendency to area unit solely victimization matter watchword to login into our personal account like checking account and Email Applications. This matter passwords area unit simply hacked by the attackers victimization guesswork attacks and Shoulder surfriding attacks. in order that the attackers will simply hack the passwords and perform any quite malicious activities. Theres no massive implementation to be introduced to extend the safety level for the users application. Conjointly Bio Metric systems area unit terribly pricey to implement in this quite application.

  3. PLANNED SYSTEM

    In the planned System we have a tendency to area unit implementing a Graphical watchword theme within which, the User needs to give the User and watchword within the matter Manner which are going to be saved within the Server for verification method. Whereas Login into the account, the User initial enters their User Id, then they need to enter the watchword by victimization Graphical theme within which the alphabets and numbers area unit splitted into equal components of various colours and therefore the User need to realize the every watchword letter is conferred within the Graphical Region. Once the enters the proper watchword, they're allowed to access the appliance.

  4. MODIFICATION

    We conjointly implement a formulae primarily based watchword Authentication theme within which the User will select the formulae whereas generating the watchword. The User needs to enter their watchword supported the formulae that we've provided in throughout the registration part. These 2 are going to be verified then solely the User is allowed to access their account.

  5. THE PLANNED FRAMEWORK

    Fig. 1. The System Framework

  6. COMPUTER PROGRAMMED STYLE

    In this module we have a tendency to area unit reaching to produce a User application by that the User is allowed to access the information from the Server. Here initial the User needs to make Associate in nursing account then solely they're allowed to access the Network. Once the User produces Associate in nursing account, they're allowed to login into their account to access the appliance. Supported the Users request, the Server can reply to the User. All the User details are going to be hold on within the information of the Server. During this Project, we are going to style the computer programmed Frame to speak with the Server through Network committal to writing victimization the programming Languages like Java/ .Net.

  7. SERVER

    The Server can monitor the complete Users data in their information and verify them if needed. Conjointly the Server can store the complete Users data in their information. Conjointly the Server needs to establish the association to speak with the Users. The Server can update the every Users activities in its information. The Server can attest every user before they access the appliance. in order that the Server can forestall the Unauthorized User from accessing the appliance.

  8. GRAPHICAL WATCHWORD

    In this module the Server can give Graphical watchword theme to enter the Users watchword. To supply this graphical watchword style of authentication method, we have a tendency to area unit developing a graphical watchword theme within which we area unit going to divide the random range into multiple blocks and these blocks are colored victimization totally different colors. The User can read the every block and check whether or not these values area unit conferred therein block. in order that the User need to select the precise watchword letter from that block.

  9. FORMULA BASED STYLE

    To provide additional security, we have a tendency to also are implementing Associate in Nursing formulae primarily based authentication mechanism within which the user can give the formulae. Whereas User logs into the account when the formulae primarily based watchword are goingto be modified. in order that the hackers aren't able to determine the precise formulae primarily based watchword theme. in order that we are able to give additional security for the appliance.

  10. AUTHENTICATION METHOD AND APPLICATION ACCESS

    In this module the Server can verify the passwords provided by the User and verify them with the information values then solely the Users area unit allowed to access the appliance. If the User enters the inaccurate watchword then the server won't enable the User to enter and access the appliance. in order that we are able to forestall the appliance from unauthorized Users access.

  11. CONCLUSION

In this paper, we've planned an easy text-based shoulder surfriding resistant graphical watchword, within which the user will simply and with efficiency complete the login method without concern concerning shoulder surfriding attacks. The operation of the planned theme is straightforward and straightforward to be told for users conversant in matter passwords. The user will simply and with efficiency to login the system while not victimization any physical keyboard or on-screen keyboard.

REFERENCES

  1. L. Sobrado and J. C. Birget, Graphical passwords, The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.

  2. L. Sobrado and J.C. Birget, Shoulder-surfing resistant graphical passwords, Draft, 2005. (http://clam.rutgers.edu/~birget/grPssw/srgp.pdf)

  3. S. Wiedenbeck, J. Waters, L. Sobrado, and J. C. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proc. of Working Conf. on Advanced Visual Interfaces, May. 2006, pp. 177-184.

  4. H. Gao, X. Liu, S. Wang, H. Liu, and R. Dai, Design and analysis of a graphical password scheme, Proc. of 4th Int. Conf. on Innovative Computing, Information and Control, Dec. 2009, pp. 675-678.

  5. B. Hartanto, B. Santoso, and S. Welly, The usage of graphical password as a replacement to the alphanumerical password, Informatika, vol. 7, no. 2, 2006, pp. 91-97.

  6. S. Man, D. Hong, and M. Mathews, A shoulder surfing resistant graphical password scheme, Proc. of the 2003 Int. Conf. on Security and Management, June 2003, pp. 105- 111 .

  7. T. Perkovic, M. Cagalj, and N. Rakic, SSSL: shoulder surfing safe login, Proc. of the 17th Int. Conf. on Software, Telecommunications & Computer Networks, Sept. 2009, pp. 270-275.

  8. Z. Zheng, X. Liu, L. Yin, and Z. Liu, A stroke-based textual password authentication scheme, Proc. of the First Int.

    Workshop. on Education Technology and Computer Science, Mar. 2009, pp. 90-95.

  9. T. Yamamoto, Y. Kojima, and M. Nishigaki, A shouldersurfing- resistant image-based authentication system with temporal indirect image selection, Proc. of the 2009 Int. Conf. on Security and Management, July 2009, pp. 188- 194.

Leave a Reply