A novel framework for security through color matching technique
Journal Title: International Scientific Research Organization Journal - Year 2016, Vol 1, Issue 5
Abstract
Objectives: Pen Test is an endorsed attempt to infringe specific constraints stated in the form of a security or integrity policy. This testing technique for discovering, understanding, and documenting all the security holes that can be found in the system, network and web application. Detecting the authorized user and preventing from the Password and shoulder surfing attacks. Provides more security than the traditional approaches. Methods: Securing confidential data such as financial, banking transactions etc., password security is not enough, we need additional authentication. Here, we have constructed a prototype model for web application security using Color Matching Random key Generation using penetration testing. Here, we generate random numbers so that the authorized user may apply this number (key) into the color matching cognitive process. Otherwise caution alert is sent to the users valid mail-id. This way of color matching technique by random key generation method of authentication will find the authorized user and it prevents the password hacking and shoulder surfing attack. We also devise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. Findings: In this paper, we generate and implemented new color matching techniques using penetration testing. We secure the web application by additional security using multilayer architecture. Our process of Penetration testing security is concerned with Password security, Random PIN number generation and to Give alert if unauthorized user hack or compromise the application's security. Improvements: To the best of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling in web applications. It provides multi tire security to prevent the new passive attack namely Shoulder surfing and password attacks.
Authors and Affiliations
M. Parameswari, Dr. T. Krishna Kumar
Complete Study on Intrusion Detection System & Tools
Usage of internet and network system have been increased heavily in the past decades which lead to increased security issues due to the intensive or malicious code use of network and computer system. The intrusion detec...
An Assisted Literature Review using Machine Learning Models to Recommend a Relevant Reference Papers List
This paper proposed an assisted literature review prototype (STELLAR – Semantic Topics Ecosystem Learning-based Literature Assistant Review) based on a semantic metadata ecosystem (SMESE) to discover, rank and recommend...
Pricing of Weather Insurance and Temperature Options and Risk Management Based on Multivariate Temperature Probability Model
Compared to the Cao-Wei model which only uses the average temperature to express the temperature characteristics, the unit temperature probability model can only be analyzed in the single region. The multivariate tempera...
Existence and uniqueness of solutions for Riemann- Liouville type fractional order q-difference systems with multi-point boundary conditions
Firstly, using q-exponential, are presentation for the solutions to this equation is given. Then under the relevant assumptions, the existence and uniqueness of the system solution are proved by Schauder fixed point theo...
COMBUSTION PERFORMANCE OF SPHERICAL-SHAPED FAECAL MATTER – SAWDUST BRIQUETTES
Faecal matter and sawdust can be considered as an expensive liability in the environment but have a huge potential for fuel briquettes that can replace firewood and charcoal as major sources of energy in rural and peri-u...