Credential Proactive Protection Guard: A Proactive Password Checking Tool
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 12
Abstract
Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that user choose password from his/her profile unintentionally which create serious problem. The password has been taken from small domain which enables hackers to crack credentials by trying different fields of the user profile. To overcome this problem, proactive password checker is required which enforces password policies and prevents users from choosing easily guessable passwords. In this paper, we have introduced proactive password checking tool (Credential Proactive Protection Guard) based on user profiling which automatically check whether the given credential is safe or not and find the relationship between user profile and credentials. The focus of the current study is to check the level of association between different fields of user profile with credentials. The detailed technique, mechanism and tool of the proposed proactive password checker is also discussed in detail.
Authors and Affiliations
MONIKA PATHAK , SUKHDEV SINGH
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
The modern wireless networks have provided a wide range of applications making it possible to successfully interconnect devices and systems which have the wireless connection facility, such as mobile phones, tablets, lap...
A Mathematical Study of Fuzzy Logic Techniques in Software Engineering Measurements
Estimation models in software engineering are used to predict some important attributes of future entities such as software development effort, software reliability and programmer productivity. Estimation by fuzzy logic...
Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering
Estimation of a software project failure is based on project analogies in the area of software cost estimation. In all software cost estimation approaches important decisions must be made regarding certain approaches in...
e-Epidemic Model On Highly Infectious Nodes in the Computer Network
In this paper, we have developed a compartmental e-Epidemic SIJR (Susceptible-Infectious-Highly Infectious- Recovered) model of viruses in a computer network with natural death (that is, crashing of nodes due to the reas...
Movement Evaluation Algorithm for video coding in Video Compression
The increase demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital video technology a necessity. A problem, however, i...