Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.

Slides:



Advertisements
Similar presentations
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Advertisements

Mr Greenhalgh S4 Computing Int 1 Things you could do with knowing before the Exam…
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
COMPUTER APPLICATIONS Mr. Toscano Computer Concepts Lesson Objectives Students are introduced to the differences between computer software and computer.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Chapter 3 Passwords Principals Authenticate to systems.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Delayed Password Disclosure Mutual Authentication to Fight Phishing Steve Myers Indiana University, Bloomington Joint work with: Markus Jakobsson Indiana.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
INTRUSION DETECTION SYSTEM
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Security Evaluation of Pattern Classifiers under Attack.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
CIS 450 – Network Security Chapter 8 – Password Security.
Abstract Many security primitives are based on hard math¬ematical problems. Using hard AI problems for security is emerging as an exciting new paradigm,
Security Planning and Administrative Delegation Lesson 6.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Identity-Based Secure Distributed Data Storage Schemes.
MOBILITY BILL DEFRAYMENT
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
Chapter 5: Input CSC 151 Beth Myers Kristy Heller Julia Zachok.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Computerized Exam Engine prepared by Nader Elkhuzundar
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
ELEMENTS OF A COMPUTER SYSTEM HARDWARE SOFTWARE PEOPLEWARE DATA.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
© 2006 Pearson Education Chapter 1: Computer Systems.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
Hardware/Software Basics Test
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Introduction To Computers
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
UNIVERSITY MANAGEMENT SYSTEM
Presentation on Online Shopping
Understanding Security Policies Lesson 3. Objectives.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
3D Password.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Information Technology (IT). Information Technology – technology used to create, store, exchange, and use information in its various forms (business data,
BY S.S.SUDHEER VARMA (13NT1D5816)
Towards Another Step from 3D Password to 4D Password:
Identify internal hardware devices (e. g
Security Using Armstrong Numbers and Authentication using Colors
An Overview of the Computer System
Authentication Schemes for Session Passwords using Color and Images
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu
A Presentation on online voting system
An Overview of the Computer System
IMAGE-BASED AUTHENTICATION
Looking Inside the Computer System
Security.
Presentation transcript:

Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security

Methods used for authentication o Textual passwords o Graphical passwords o Session passwords

Common Method: o textual passwords Alternative techniques: o graphical passwords o biometrics New authentication schemes: o session passwords

Dhamija and perig proposed a graphical authentication schema to identify the predefined images. User selects a random number of pictures. Identify the pre selected images for authentication.

Passface technique:- The user has to choose four images of human faces from a face database as their future password. User selects a human face. In the authentication stage, the user gets a grid of nine faces, consisting of one face previously chosen by the user and eight decoy faces.

Syukir developed a technique where the authentication is done by drawing user signature using mouse. » Registration phage » Verification phage At the time of registration the user draw his signature with the mouse. In the verification stage it takes the user signature as the input and verify it.

» Dictionary attacks » Shoulder surfing » Forgery

New authentication schemes: o Pair based o Hybrid textual

Authentication technique consist of 3 phases:  Registration phase: user enters his password  Login phase: the user has enter the password based on the interface displayed on the screen  Verification phase

Login interface

Intersection letter for the pair AN

Rating of colors by the user

Password:3573 Depending on the rating given to colors, we get session password Login interface

SECURITY ANALYSIS  Dictionary attack  A simple dictionary attack is by far the fastest way to break into a machine.  A dictionary file (a text file full of dictionary words) is loaded into a cracking application(such as L0phtCrack), which is run against user accounts located by the application.  Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to the job.

Brute Force Attack Brute Force Attack is the most widely known password cracking method. It based on attempts to use every possible character combination as a potential password. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases.

Phishing :- It is typically carried out by spoofing spoofing or instant messaging, and it often directs users to enter details at a fake websiteinstant messaging whose look and feel are almost identical tolook and feel the legitimate one. Phishing is an example of social engineering techniques used tosocial engineering deceive users, and exploits the poor usability of current web security technologies.

REQUIREMENTS HARDWARE SPECIFICATION – Processor : Intel Pentium IV, 2GHz – RAM : 512MB – Hard Disk Capacity : 40GB – Keyboard : Standard 104 keys – Mouse : Standard 3 Button – DVD/CD ROM : LG DVD RAM SOFTWARE SPECIFICATION – Operating System : Win XP and Above – Database : SQL Server 2008 – System Architecture :.NET Framework Programming Language : PHP

Two authentication techniques based on text and colors are proposed. Techniques generate session passwords and are resistant to dictionary attack, shoulder surfing. In Pair based during login time on the grid displayed a session password is generated. In hybrid textual scheme rating should be given to colors. Schemes are completely new to the users and the proposed authentication techniques should be verified extensively for usability and effectiveness.

[1] R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, [2] Real User Corporation: Passfaces. [3] X. Suo, Y. Zhu and G. Owen, “Graphical Passwords: A Survey”. In Proc. ACSAC'05. [4] Z. Zheng, X. Liu, L. Yin, Z. Liu “A Hybrid password authentication scheme based on shape and Text” Journal of Computers, vol.5, no.5 May 2010.