Shoulder surfing resistant graphical and image based login system

14
Group Members Tanavi Dalavi Vishakha More Sonali Jadhav Guide Mrs. Vijaya Chavan

description

project

Transcript of Shoulder surfing resistant graphical and image based login system

Page 1: Shoulder surfing resistant graphical and image based login system

Group Members

Tanavi Dalavi

Vishakha More

Sonali Jadhav

GuideMrs. Vijaya Chavan

Page 2: Shoulder surfing resistant graphical and image based login system

Existing System Contains User_Name and Password Based Method.

Threats To The Existing

System are :

Shoulder Keylogger Bots

Surfing

Page 3: Shoulder surfing resistant graphical and image based login system

When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation.

Page 4: Shoulder surfing resistant graphical and image based login system

Key stroke are recorded

Threat to login system as

the username and

password recorded

BotsPerform simple and repetitive tasks

Page 5: Shoulder surfing resistant graphical and image based login system

Text Based Password are subject to attacked by following ways

In shoulder surfing attacker can capture a password by direct observation

In key logger attacker record the individual’s authentication session.

In bots attack the automated or semi-automated robots do the same

Page 6: Shoulder surfing resistant graphical and image based login system

Sensitive Information requires high security

Authentication processes to keep information secure

Authentication Methods

Graphical Image Based

Password Based Password

Page 7: Shoulder surfing resistant graphical and image based login system

If password is “deokar”

Page 8: Shoulder surfing resistant graphical and image based login system
Page 9: Shoulder surfing resistant graphical and image based login system

A grid of image is displayed, where the user will select a particular images from the grid.

The aim of this authentication is to avoid attack from a script or another machine.

A keylogger or bot attack can be avoided.

Page 10: Shoulder surfing resistant graphical and image based login system
Page 11: Shoulder surfing resistant graphical and image based login system
Page 12: Shoulder surfing resistant graphical and image based login system

HARDWARE:

Processor: Pentium-IV 1.5 GHz and above

Ram: 256 MB minimum

512 MB preferred

Monitor: 15 inch

CD-ROM: 52x speed

SOFTWARE:

Operating System: Microsoft Windows XP and above.

Software: JDK 1.5 and higher.

Page 13: Shoulder surfing resistant graphical and image based login system

Websites:

www.ieeexplore.ieee.org

www.wikipedia.com

Book:

“Network Security-Overcome Password Hacking Through Graphical Password Authentication’’

M.ArunPrakash ,T.R.Gokul

Department of Information Technology, Tamil Nadu, India

“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:” A User Study Using Images for Authentication

Page 14: Shoulder surfing resistant graphical and image based login system