Defending Online Password Hunch Attacks Using Persuasive Cued Click Points

Abstract

 Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. Therefore, this project work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method. Pass Points (PP) is a click-based graphical password system where a password consists of an ordered sequence of five click-points on a pixel-based image. To log in, a user must click within some system-defined tolerance region for each click-point. The image acts as a cue to help users remember their password click-points. To address the issue of hotspots, Persuasive Cued Click Points (PCCP) was proposed. As with CCP, a password consists of five click points, one on each of five images. During password creation, most of the image is dimmed except for a small view port area that is randomly positioned on the image. Users must select a click-point within the view port. If they are unable or unwilling to select a point in the current view port, they may press the Shuffle button to randomly reposition the view port. The view port guides users to select more random passwords that are less likely to include hotspots. A user who is determined to reach a certain click-point may still shuffle until the view port moves to the specific location

Authors and Affiliations

Keywords

Related Articles

 Video Inpainting for Moving Object Removal Using Patch Sparsity

 The process of removing and reconstructing the specific area in video is known as video Inpainting. Most of the automatic techniques of video Inpainting are computationally intensive and unable to repair large hol...

 BACK PROPAGATION NEURAL NETWORK FOR OBJECT DETECTION AND CLASSIFICATION OVER VIDEO DATA

 The vehicle detection on roads becomes an important task when it comes to the urban surveillance and monitoring the traffic on the roads. The live monitoring of the tasks over the roads requires the specifically d...

 Galois Field and Security for Online Data Storage in Cloud Computing

 Cloud computing provides online data storage in which data is travelling over the Internet and is stored in remote locations so cloud computing presents a number of security concerns .We describe in this paper how...

Studies on Tool Wear, Cutting Forces and Chip Morphology During High-Speed Milling of Al-Si-Mg- Fe Alloys

This paper investigates the High speed end milling of Al-Si-Mg-Fe alloy for aerospace and automotive industry. High speed machining has received important interest because it leads to an increase of productivity and a...

Analysis of Regenerator for Reversed Stirling Cycle Which Various Geometry

Analysis of regenerator deals with assumptions made for analysis and different equation use to predict the performance of regenerator Problem and sample calculation deals with problem and calculation of various paramete...

Download PDF file
  • EP ID EP152988
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2014).  Defending Online Password Hunch Attacks Using Persuasive Cued Click Points. International Journal of Engineering Sciences & Research Technology, 3(12), 327-334. https://europub.co.uk/articles/-A-152988