Defending Online Password Hunch Attacks Using Persuasive Cued Click Points

Abstract

 Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. Therefore, this project work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method. Pass Points (PP) is a click-based graphical password system where a password consists of an ordered sequence of five click-points on a pixel-based image. To log in, a user must click within some system-defined tolerance region for each click-point. The image acts as a cue to help users remember their password click-points. To address the issue of hotspots, Persuasive Cued Click Points (PCCP) was proposed. As with CCP, a password consists of five click points, one on each of five images. During password creation, most of the image is dimmed except for a small view port area that is randomly positioned on the image. Users must select a click-point within the view port. If they are unable or unwilling to select a point in the current view port, they may press the Shuffle button to randomly reposition the view port. The view port guides users to select more random passwords that are less likely to include hotspots. A user who is determined to reach a certain click-point may still shuffle until the view port moves to the specific location

Authors and Affiliations

Keywords

Related Articles

AN ACCELEROMETER BASED DIGITAL PEN WITH TRAJECTORY RECOGNITION ALGORITHM FOR HANDWRITTEN DIGIT AND GESTURE RECOGNITIO N

The paper aims is to design an accelerometer based digital pen with trajectory recognition algorithm for handwritten digit and gesture recognition by using Zigbee technology. This system uses a MEMS device...

 Overview of Mobile Computing: A Review

 Mobile computing is a form of human– computer interaction by which a computer is expected to be transported during normal usage. Mobile computing has three aspects: mobile communication, mobile hardware, and mobi...

 EDUCTIONAL TELEVISION PROGRAM EXPOSURE AND CHEMISTRY PERFORMANCE OF THE THIRD YEAR LABORATORY HIGH SCHOOL STUDENTS OF NAVAL STATE UNIVERSITY

 The study was conducted to determine the effects of educational television program exposure on Chemistry performance of the third year laboratory high school students of Naval State University. Employing the o...

 REVIEW OF PARALLEL COMPUTING, PARALLEL PROGRAMMING AND ITS APPLICATIONS

 The next generation computing systems are focusing on parallel computing to solve the problem in fast and high speed using parallel programming concepts. The running time of any complex algorithm or applications c...

 OPTIMAL DESIGN OF SPARSE FIR FILTER USING GENETIC ALGORITHM

 Sparse design of FIR filter has been used for reducing the implementation complexity and computational cost. The objective of the sparse FIR filter design problem considered in this paper is to reduce the number o...

Download PDF file
  • EP ID EP152988
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

(2014).  Defending Online Password Hunch Attacks Using Persuasive Cued Click Points. International Journal of Engineering Sciences & Research Technology, 3(12), 327-334. https://europub.co.uk/articles/-A-152988