14
Group Members Tanavi Dalavi Vishakha More Sonali Jadhav Guide Mrs. Vijaya Chavan

Shoulder surfing resistant graphical and image based login system

Embed Size (px)

DESCRIPTION

project

Citation preview

Page 1: Shoulder surfing resistant graphical and image based login system

Group Members

Tanavi Dalavi

Vishakha More

Sonali Jadhav

GuideMrs. Vijaya Chavan

Page 2: Shoulder surfing resistant graphical and image based login system

Existing System Contains User_Name and Password Based Method.

Threats To The Existing

System are :

Shoulder Keylogger Bots

Surfing

Page 3: Shoulder surfing resistant graphical and image based login system

When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation.

Page 4: Shoulder surfing resistant graphical and image based login system

Key stroke are recorded

Threat to login system as

the username and

password recorded

BotsPerform simple and repetitive tasks

Page 5: Shoulder surfing resistant graphical and image based login system

Text Based Password are subject to attacked by following ways

In shoulder surfing attacker can capture a password by direct observation

In key logger attacker record the individual’s authentication session.

In bots attack the automated or semi-automated robots do the same

Page 6: Shoulder surfing resistant graphical and image based login system

Sensitive Information requires high security

Authentication processes to keep information secure

Authentication Methods

Graphical Image Based

Password Based Password

Page 7: Shoulder surfing resistant graphical and image based login system

If password is “deokar”

Page 8: Shoulder surfing resistant graphical and image based login system
Page 9: Shoulder surfing resistant graphical and image based login system

A grid of image is displayed, where the user will select a particular images from the grid.

The aim of this authentication is to avoid attack from a script or another machine.

A keylogger or bot attack can be avoided.

Page 10: Shoulder surfing resistant graphical and image based login system
Page 11: Shoulder surfing resistant graphical and image based login system
Page 12: Shoulder surfing resistant graphical and image based login system

HARDWARE:

Processor: Pentium-IV 1.5 GHz and above

Ram: 256 MB minimum

512 MB preferred

Monitor: 15 inch

CD-ROM: 52x speed

SOFTWARE:

Operating System: Microsoft Windows XP and above.

Software: JDK 1.5 and higher.

Page 13: Shoulder surfing resistant graphical and image based login system

Websites:

www.ieeexplore.ieee.org

www.wikipedia.com

Book:

“Network Security-Overcome Password Hacking Through Graphical Password Authentication’’

M.ArunPrakash ,T.R.Gokul

Department of Information Technology, Tamil Nadu, India

“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:” A User Study Using Images for Authentication

Page 14: Shoulder surfing resistant graphical and image based login system