A novel framework for security through color matching technique

Journal Title: International Scientific Research Organization Journal - Year 2016, Vol 1, Issue 5

Abstract

Objectives: Pen Test is an endorsed attempt to infringe specific constraints stated in the form of a security or integrity policy. This testing technique for discovering, understanding, and documenting all the security holes that can be found in the system, network and web application. Detecting the authorized user and preventing from the Password and shoulder surfing attacks. Provides more security than the traditional approaches. Methods: Securing confidential data such as financial, banking transactions etc., password security is not enough, we need additional authentication. Here, we have constructed a prototype model for web application security using Color Matching Random key Generation using penetration testing. Here, we generate random numbers so that the authorized user may apply this number (key) into the color matching cognitive process. Otherwise caution alert is sent to the users valid mail-id. This way of color matching technique by random key generation method of authentication will find the authorized user and it prevents the password hacking and shoulder surfing attack. We also devise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. Findings: In this paper, we generate and implemented new color matching techniques using penetration testing. We secure the web application by additional security using multilayer architecture. Our process of Penetration testing security is concerned with Password security, Random PIN number generation and to Give alert if unauthorized user hack or compromise the application's security. Improvements: To the best of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling in web applications. It provides multi tire security to prevent the new passive attack namely Shoulder surfing and password attacks.

Authors and Affiliations

M. Parameswari, Dr. T. Krishna Kumar

Keywords

Related Articles

ADOPTIVE TRANSFER OF GLYPICAN-3 PEPTIDE-SPECIFIC CD8 T LYMPHOCYTES CAUSES REGRESSION OF TESTICULAR YOLK SAC TUMOR IN MICE

Background: Glypican-3 (GPC3) is overexpressed in testicular yolk sac tumor (TYST) which has a poor prognosis and needs novel effective treatment strategies. The potential of GPC3 as a cancer vaccine for TYST was explore...

COMMON FIXED POINT THEOREMS USING PROP. (E.A) IN COMPLEX VALUED b Metric SPACES

Azam et al. [3] introduced the notion of complex valued metric space and obtained a common fixed point result for mappings satisfying rational inequality in this space. Czerwik [9] proved a contraction theorem in b-metri...

Anatomical Study of Vagal Trunks at Gastro Esophageal Junction

Vagus is the chief parasympathetic nerve to the most of the organs in the neck, thorax and abdomen. The number and position of anterior and posterior vagal trunks have variations at the gastro esophageal junction. This i...

A novel framework for security through color matching technique

Objectives: Pen Test is an endorsed attempt to infringe specific constraints stated in the form of a security or integrity policy. This testing technique for discovering, understanding, and documenting all the security h...

PROACTIVE AND REACTIVE ROUTING PROTOCOL BASED ON A MODIFIED DIJKSTRA’S ALGORITHM

Mobile ad hoc networks (MANETs) are highly vulnerable to both link and node failure due to nodal mobility. The routing flexibility against link and/or node failure needs to be enhanced to avoid the degradation of network...

Download PDF file
  • EP ID EP192024
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

M. Parameswari, Dr. T. Krishna Kumar (2016). A novel framework for security through color matching technique. International Scientific Research Organization Journal, 1(5), 1-7. https://europub.co.uk/articles/-A-192024