A novel framework for security through color matching technique
Journal Title: International Scientific Research Organization Journal - Year 2016, Vol 1, Issue 5
Abstract
Objectives: Pen Test is an endorsed attempt to infringe specific constraints stated in the form of a security or integrity policy. This testing technique for discovering, understanding, and documenting all the security holes that can be found in the system, network and web application. Detecting the authorized user and preventing from the Password and shoulder surfing attacks. Provides more security than the traditional approaches. Methods: Securing confidential data such as financial, banking transactions etc., password security is not enough, we need additional authentication. Here, we have constructed a prototype model for web application security using Color Matching Random key Generation using penetration testing. Here, we generate random numbers so that the authorized user may apply this number (key) into the color matching cognitive process. Otherwise caution alert is sent to the users valid mail-id. This way of color matching technique by random key generation method of authentication will find the authorized user and it prevents the password hacking and shoulder surfing attack. We also devise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. Findings: In this paper, we generate and implemented new color matching techniques using penetration testing. We secure the web application by additional security using multilayer architecture. Our process of Penetration testing security is concerned with Password security, Random PIN number generation and to Give alert if unauthorized user hack or compromise the application's security. Improvements: To the best of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling in web applications. It provides multi tire security to prevent the new passive attack namely Shoulder surfing and password attacks.
Authors and Affiliations
M. Parameswari, Dr. T. Krishna Kumar
A novel framework for security through color matching technique
Objectives: Pen Test is an endorsed attempt to infringe specific constraints stated in the form of a security or integrity policy. This testing technique for discovering, understanding, and documenting all the security h...
Energy Efficient and Secure Session-Key Establishment Scheme in Smart Home Environments
The proliferations of current wireless communications and information technologies have been altering human’s lifestyle and social interactions—the next frontier is the smart home environments or spaces. A smart home con...
Color Doppler Imaging and Glaucoma: Comparison of Doppler Waveform of Retrobulbar Vessels between a Glaucomatous Patient and a Healthy Subject
Ocular blood flow abnormalities are believed to play an important role in the pathogenesis of primary open angle glaucoma (POAG). For this reason the Colour Doppler Imaging (CDI) evaluation of the retrobulbar vessels is...
Dental Arch Dimensions in Patients with Mild, Moderate and Severe Hypodontia and a Control Group
Objectives: To compare maxillary and mandibular dental arch dimensions between subjects with mild, moderate and severe hypodontia and a control group. Method and Materials: The study comprised 120 patients with hypodonti...
An Assisted Literature Review using Machine Learning Models to Recommend a Relevant Reference Papers List
This paper proposed an assisted literature review prototype (STELLAR – Semantic Topics Ecosystem Learning-based Literature Assistant Review) based on a semantic metadata ecosystem (SMESE) to discover, rank and recommend...