SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
The International Journal Of Engineering And Science (IJES)
||Volume||2 ||Issue|| 6 ||Pages|| 26-29||2013||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805
www.theijes.com The IJES Page 26
Improving Efficiency of Password Security Against Large Scale
Online Attacks
Harshitha.H.K1
And Sreedevi.N2
1
4th
sem M.Tech, Department of CSE, MVJ College of Engineering, Bangalore-560067, Visveswariah
Technological university, Belgaum, Karnataka, India
2
Hod,Assistant Professor, Department of Computer Science and Engineering, MVJ College of Engineering,
Bangalore-560067, Karnataka, India
--------------------------------------------------------ABSTRACT--------------------------------------------------
The use of passwords is a major point of vulnerability in computer security, as passwords are often easy to
guess by automated programs running dictionary attacks. From a user’s perspective user friendliness is a key
requirement. Brute force and dictionary attacks on password-only remote login services are now widespread
and ever increasing. Enabling convenient login for legitimate users while preventing online attacks is a major
concern in security systems. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy
approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In
this paper a novel authentication scheme that preserves the advantages of conventional password authentication
is proposed, while simultaneously raising the costs of online dictionary attacks by orders of magnitude. The
proposed scheme is easy to implement and overcomes some of the difficulties of previously suggested methods
for improving the security of user authentication schemes. The key idea is to efficiently combine traditional
password authentication with a challenge that is very easy to answer by human users, but is infeasible for
automated programs attempting to run dictionary attacks. This is done without affecting the usability of the
system. A new Password Guessing Resistant Protocol (PGRP) is proposed, derived upon revisiting prior
proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from
unknown remote hosts to as low as a single attempt per username, legitimate users in most cases (e.g., when
attempts are made from known, frequently-used machines) can make several failed login attempts before
being challenged with an ATT.
-------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 20 June 2013, Date of Publication: 5.july 2013
-------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Online attacks on password based systems are inevitable and commonly observed against web
applications. Online guessing attacks on password-based attacks have some inherent disadvantages compared to
offline attacks: attacking machines must engage in an interactive protocol, thus allowing easier detection; and in
most cases, attackers can try only limited number of guesses from a single machine before being locked out,
delayed, or challenged to answer Automated Turing Tests (ATTs, e.g., CAPTCHAs [24]). Consequently,
attackers often must employ a large number of machines to avoid detection or lock-out. On the other hand, as
users generally choose common and relatively weak passwords and attackers currently control large botnets,
online attacks are much easier than before.
One effective defense against automated online password guessing attacks is to restrict the number of
failed trials without ATTs to a very small number (e.g., three), limiting automated programs (or bots) as used by
attackers to three free password guesses for a targeted account, even if different machines from a botnet are
used. However, this inconveniences the legitimate user who then must answer an ATT on the next login attempt.
Several other techniques are deployed in practice, including: allowing login attempts without ATTs from a
different machine, when a certain number of failed attempts occur from a given machine; allowing more
attempts without ATTs after a timeout period; and time limited account locking. Many existing techniques and
proposals involve ATTs, with the underlying assumption that these challenges are sufficiently difficult for bots
and easy for most people. However, users increasingly dislike ATTs as these are perceived as an (unnecessary)
extra step. Due to successful attacks which break ATTs without human solvers ATTs perceived to be more
difficult for bots are being deployed. As a consequence of this arms-race, present-day ATTs are becoming
increasingly difficult for human users , fueling a growing tension between security and usability of ATTs.
Improving Efficiency Of Password…
www.theijes.com The IJES Page 27
Therefore, the focus is on reducing user annoyance by challenging users with fewer ATTs, while at the same
time subjecting bot logins to more ATTs, to drive up the economic cost to attackers.
II. METHODOLOGY
The protocol proposed in this work here uses the ATTs-Automated turing tests (also commonly known
as CAPTCHAS) to operate against online attackers. The Automated Turing test (ATT) is a standard security
technique for addressing the threat of undesirable or malicious bot programs. The basic idea of CAPTCHA is to
force there to be a human in the loop –it works as a simple two-round authentication protocol as follows.
S(ervice) → C(lient): a CAPTCHA challenge
C → S: response
A CAPTCHA challenge is a test that most humans can pass but current computer programs cannot
pass. Such a test is often based on a hard, open problem in artificial intelligence, e.g. automatic recognition of
distorted text, or of human speech against a noisy background. Usually, CAPTCHA challenges are
automatically generated and graded by a computer. Since only humans are able to return a sensible response, an
automated Turing test embedded in the above protocol can verify whether an attack is automated or there is a
human behind the challenged computer.In particular, to limit attackers in control of a large botnet (e.g.,
comprising hundreds of thousands of bots), PGRP enforces ATTs after a few (e.g., three) failed login attempts
are made from unknown machines. On the other hand, PGRP allows a high number (e.g., 30) of failed attempts
from known machines without answering any ATTs. We define known machines as those from which a
successful login has occurred within a fixed period of time. These are identified by their IP addresses saved on
the login server as a white-list, or cookies stored on client machines. A white-listed IP address and/or client
cookie expires after a certain time. PGRP accommodates both graphical user interfaces (e.g., browser-based
logins) and character-based interfaces (e.g., SSH logins
). PGRP uses either cookies or IP addresses, or both for tracking legitimate users. Tracking users through their
IP addresses also allows PGRP to increase the number of ATTs for password guessing attacks and meanwhile to
decrease the number of ATTs for legitimate login attempts.
III. SYSTEM DESIGN
Fig 1:Architectural diagram
3.1.Function modules:
Data administrator
The administrator’s major objective is to control the data and usage of the legitimate user. The details
of the user are got in a form for the creation of account, and the user’s credentials are checked manually then
using those details the account is created if the credentials are correct. After the successful login the legitimate
user can do all the required tasks. The login program invokes the user shell and enables command execution.
Login is the very first step for the user to use their account. The usage of login form is to give security to the
user. If the user doesn’t have the account then the user should create the account. A new account is created by
the administrator for the legitimate user. Data structures/tables created: PGRP maintains three data structures:
Improving Efficiency Of Password…
www.theijes.com The IJES Page 28
1) W: A list of source IP address, username pairs such that for each pair, a successful login from the source IP
address has been initiated for the username previously.
2) FT: Each entry in this table represents the number of failed login attempts for a valid username, un. A
maximum of k2- failed login attempts are recorded.
Accessing a non-existing index returns 0.
3) FS: Each entry in this table represents the number of failed login attempts for each pair of (srcIP, un). Here,
srcIP is the IP address for a host in W or a host with a valid cookie, and un is a valid username attempted from
srcIP. A maximum of k1 -failed login attempts are recorded; crossing this threshold may mandate passing an
ATT (e.g., depending on FT[un]). An entry is set to 0 after a successful login attempt. Accessing a non-existing
index returns 0.
3.2. PGRP Login Controller
The main objective of this module is to control the access to the user accounts. The controller displays
the login form and upon receiving the login credentials, sends these data to login validator. The login controller
then, based upon the response from login validator decides whether to grant access or deny access to the user. It
also keeps track of user status information with the help of user cookies.
3.3.PGRP Validator
The main function of this module is to validate the data entered by the user in the login form by
comparing it against the data stored by the administrator corresponding to that user .It checks for valid email
address, passwords, no. of failed login attempts etc: . Update and deletion functions are also carried out by this
module. It decides whether a user is valid or not by following his/her login behavior and checking his/her failed
login attempts against threshold values assigned to them. If a user exceeds the failed threshold value and fails to
answer an ATT function, user is asserted as invalid and denied access. PGRP uses the following functions:
a. ReadCredential(OUT: un,pw,cookie): Shows a login prompt to the user and returns the entered username
and password, and the cookie received from the user’s browser (if any).
b. LoginCorrect(IN: un,pw; OUT: true/false): If the provided username-password pair is valid, the function
returns true; otherwise, it returns false.
c. GrantAccess(IN: un,cookie): The function sends the cookie to the user’s browser and then enables access
to the specified user account.
d. Message(IN: text): Shows a text message.
e. ATTChallenge(OUT: Pass/Fail): Challenges the user with an ATT and returns “Pass” if the answer is
correct; otherwise, it returns “Fail”.
f. V alidUsername(IN: un; OUT: true/false): If the provided username exists in the login system, the function
returns true; otherwise, it returns false.
g. V alid(IN: cookie,un,k1,state; OUT: cookie,true/false): First, the function checks the validity of the cookie
(if any) where it is considered invalid in the following cases: (1) the login username does not match the
cookie username; (2) the cookie is expired; or (3) the cookie counter is equal to or greater than k1.
IV. ANALYSIS OF TEST CASES
Table 6.4 Summary of test cases
Test ID Test Name Input Actual result Expected result
1 Known User login
(valid cookie)
Valid username
and password
Successful login
message displayed
Successful login
Message displayed
2 Known user login
(expired cookie)
Valid username
and password
Requested to answer an
ATT challenge
Requested to answer an
ATT challenge
3 User login from
unknown machine
Valid username
and password
After exceeding known
user failure attempt
threshold(10)
After exceeding known
user failure attempt
threshold ,challenged
Improving Efficiency Of Password…
www.theijes.com The IJES Page 29
,challenged with an ATT with an ATT
4 User login from
known machine
after few failed
attempts
Valid username
and password
,correct reply to
ATT challenge
ATT answered
successfully and access
granted
ATT answered
successfully and access
granted
5 Hacker/bot login Valid Username
and incorrect
password
3 login attempts allowed
,later challenged with
ATT
3 login attempts allowed
,later challenged with
ATT
All the above test cases have been tested and expected results have been observed.
s
napshot: login with wrong password; limit exceeded snapshot: successful login showing creation of
user cookie
V. CONCLUSION
Online password guessing attacks on password-only systems have been observed for decades. Present-
day attackers targeting such systems are empowered by having control of thousand to million node botnets. In
previous ATT-based login protocols, there exists a security-usability trade-off with respect to the number of free
failed login attempts (i.e., with no ATTs) versus user login convenience (e.g., less ATTs and other
requirements). In contrast, PGRP is more restrictive against brute force and dictionary attacks while safely
allowing a large number of free failed attempts for legitimate users. The work shows that while PGRP is
apparently more effective in preventing password guessing attacks (without answering ATT challenges), it also
offers more convenient login experience, e.g., fewer ATT challenges for legitimate users even if no cookies are
available. However, no user-testing of PGRP has been conducted so far. PGRP appears suitable for
organizations of both small and large number of user accounts. The required system resources (e.g., memory
space) are linearly proportional to the number of users in a system. PGRP can also be used with remote login
services where cookies are not applicable.
REFERENCES
[1] B. Pinkas and T. Sander. -Securing passwords against dictionary attacks in ACM conference on Computer and
communications security
[2] E. Bursztein, S. Bethard, J. C. Mitchell, D. Jurafsky, and C. Fabry "How good a humans at solving CAPTCHAs? "
[3] P. C. van Oorschot and S. Stubblebine- On countering online dictionary attacks with login histories and humans-in-the-loop.

Weitere ähnliche Inhalte

Was ist angesagt?

Web Application Technologies
Web Application TechnologiesWeb Application Technologies
Web Application TechnologiesSehan Lee
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Web Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWeb Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWebsecurify
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of ThingsEswar Publications
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online bankingJakub Kałużny
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answersSimpliv LLC
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Security Testing For Web Applications
Security Testing For Web ApplicationsSecurity Testing For Web Applications
Security Testing For Web ApplicationsVladimir Soghoyan
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET Journal
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsEswar Publications
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasuresidescitation
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionIRJET Journal
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 

Was ist angesagt? (20)

Web Application Technologies
Web Application TechnologiesWeb Application Technologies
Web Application Technologies
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Nii sample pt_report
Nii sample pt_reportNii sample pt_report
Nii sample pt_report
 
Web Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWeb Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session Management
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
 
7317ijcis01
7317ijcis017317ijcis01
7317ijcis01
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Security Testing For Web Applications
Security Testing For Web ApplicationsSecurity Testing For Web Applications
Security Testing For Web Applications
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 

Andere mochten auch

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 

Andere mochten auch (7)

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 

Ähnlich wie The International Journal of Engineering and Science (The IJES)

Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIJMTST Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivityIRJET Journal
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET Journal
 
Analysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating SystemAnalysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating SystemDarian Pruitt
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...IRJET Journal
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attackseSAT Journals
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accesseSAT Journals
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponseErtugrul Akbas
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromeSAT Publishing House
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user AuthenticationIRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...IRJET Journal
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 

Ähnlich wie The International Journal of Engineering and Science (The IJES) (20)

Cw4201656660
Cw4201656660Cw4201656660
Cw4201656660
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
 
Analysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating SystemAnalysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating System
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attacks
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script access
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages from
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

The International Journal of Engineering and Science (The IJES)

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 6 ||Pages|| 26-29||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 www.theijes.com The IJES Page 26 Improving Efficiency of Password Security Against Large Scale Online Attacks Harshitha.H.K1 And Sreedevi.N2 1 4th sem M.Tech, Department of CSE, MVJ College of Engineering, Bangalore-560067, Visveswariah Technological university, Belgaum, Karnataka, India 2 Hod,Assistant Professor, Department of Computer Science and Engineering, MVJ College of Engineering, Bangalore-560067, Karnataka, India --------------------------------------------------------ABSTRACT-------------------------------------------------- The use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated programs running dictionary attacks. From a user’s perspective user friendliness is a key requirement. Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing online attacks is a major concern in security systems. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this paper a novel authentication scheme that preserves the advantages of conventional password authentication is proposed, while simultaneously raising the costs of online dictionary attacks by orders of magnitude. The proposed scheme is easy to implement and overcomes some of the difficulties of previously suggested methods for improving the security of user authentication schemes. The key idea is to efficiently combine traditional password authentication with a challenge that is very easy to answer by human users, but is infeasible for automated programs attempting to run dictionary attacks. This is done without affecting the usability of the system. A new Password Guessing Resistant Protocol (PGRP) is proposed, derived upon revisiting prior proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from unknown remote hosts to as low as a single attempt per username, legitimate users in most cases (e.g., when attempts are made from known, frequently-used machines) can make several failed login attempts before being challenged with an ATT. ------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 20 June 2013, Date of Publication: 5.july 2013 ------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Online attacks on password based systems are inevitable and commonly observed against web applications. Online guessing attacks on password-based attacks have some inherent disadvantages compared to offline attacks: attacking machines must engage in an interactive protocol, thus allowing easier detection; and in most cases, attackers can try only limited number of guesses from a single machine before being locked out, delayed, or challenged to answer Automated Turing Tests (ATTs, e.g., CAPTCHAs [24]). Consequently, attackers often must employ a large number of machines to avoid detection or lock-out. On the other hand, as users generally choose common and relatively weak passwords and attackers currently control large botnets, online attacks are much easier than before. One effective defense against automated online password guessing attacks is to restrict the number of failed trials without ATTs to a very small number (e.g., three), limiting automated programs (or bots) as used by attackers to three free password guesses for a targeted account, even if different machines from a botnet are used. However, this inconveniences the legitimate user who then must answer an ATT on the next login attempt. Several other techniques are deployed in practice, including: allowing login attempts without ATTs from a different machine, when a certain number of failed attempts occur from a given machine; allowing more attempts without ATTs after a timeout period; and time limited account locking. Many existing techniques and proposals involve ATTs, with the underlying assumption that these challenges are sufficiently difficult for bots and easy for most people. However, users increasingly dislike ATTs as these are perceived as an (unnecessary) extra step. Due to successful attacks which break ATTs without human solvers ATTs perceived to be more difficult for bots are being deployed. As a consequence of this arms-race, present-day ATTs are becoming increasingly difficult for human users , fueling a growing tension between security and usability of ATTs.
  • 2. Improving Efficiency Of Password… www.theijes.com The IJES Page 27 Therefore, the focus is on reducing user annoyance by challenging users with fewer ATTs, while at the same time subjecting bot logins to more ATTs, to drive up the economic cost to attackers. II. METHODOLOGY The protocol proposed in this work here uses the ATTs-Automated turing tests (also commonly known as CAPTCHAS) to operate against online attackers. The Automated Turing test (ATT) is a standard security technique for addressing the threat of undesirable or malicious bot programs. The basic idea of CAPTCHA is to force there to be a human in the loop –it works as a simple two-round authentication protocol as follows. S(ervice) → C(lient): a CAPTCHA challenge C → S: response A CAPTCHA challenge is a test that most humans can pass but current computer programs cannot pass. Such a test is often based on a hard, open problem in artificial intelligence, e.g. automatic recognition of distorted text, or of human speech against a noisy background. Usually, CAPTCHA challenges are automatically generated and graded by a computer. Since only humans are able to return a sensible response, an automated Turing test embedded in the above protocol can verify whether an attack is automated or there is a human behind the challenged computer.In particular, to limit attackers in control of a large botnet (e.g., comprising hundreds of thousands of bots), PGRP enforces ATTs after a few (e.g., three) failed login attempts are made from unknown machines. On the other hand, PGRP allows a high number (e.g., 30) of failed attempts from known machines without answering any ATTs. We define known machines as those from which a successful login has occurred within a fixed period of time. These are identified by their IP addresses saved on the login server as a white-list, or cookies stored on client machines. A white-listed IP address and/or client cookie expires after a certain time. PGRP accommodates both graphical user interfaces (e.g., browser-based logins) and character-based interfaces (e.g., SSH logins ). PGRP uses either cookies or IP addresses, or both for tracking legitimate users. Tracking users through their IP addresses also allows PGRP to increase the number of ATTs for password guessing attacks and meanwhile to decrease the number of ATTs for legitimate login attempts. III. SYSTEM DESIGN Fig 1:Architectural diagram 3.1.Function modules: Data administrator The administrator’s major objective is to control the data and usage of the legitimate user. The details of the user are got in a form for the creation of account, and the user’s credentials are checked manually then using those details the account is created if the credentials are correct. After the successful login the legitimate user can do all the required tasks. The login program invokes the user shell and enables command execution. Login is the very first step for the user to use their account. The usage of login form is to give security to the user. If the user doesn’t have the account then the user should create the account. A new account is created by the administrator for the legitimate user. Data structures/tables created: PGRP maintains three data structures:
  • 3. Improving Efficiency Of Password… www.theijes.com The IJES Page 28 1) W: A list of source IP address, username pairs such that for each pair, a successful login from the source IP address has been initiated for the username previously. 2) FT: Each entry in this table represents the number of failed login attempts for a valid username, un. A maximum of k2- failed login attempts are recorded. Accessing a non-existing index returns 0. 3) FS: Each entry in this table represents the number of failed login attempts for each pair of (srcIP, un). Here, srcIP is the IP address for a host in W or a host with a valid cookie, and un is a valid username attempted from srcIP. A maximum of k1 -failed login attempts are recorded; crossing this threshold may mandate passing an ATT (e.g., depending on FT[un]). An entry is set to 0 after a successful login attempt. Accessing a non-existing index returns 0. 3.2. PGRP Login Controller The main objective of this module is to control the access to the user accounts. The controller displays the login form and upon receiving the login credentials, sends these data to login validator. The login controller then, based upon the response from login validator decides whether to grant access or deny access to the user. It also keeps track of user status information with the help of user cookies. 3.3.PGRP Validator The main function of this module is to validate the data entered by the user in the login form by comparing it against the data stored by the administrator corresponding to that user .It checks for valid email address, passwords, no. of failed login attempts etc: . Update and deletion functions are also carried out by this module. It decides whether a user is valid or not by following his/her login behavior and checking his/her failed login attempts against threshold values assigned to them. If a user exceeds the failed threshold value and fails to answer an ATT function, user is asserted as invalid and denied access. PGRP uses the following functions: a. ReadCredential(OUT: un,pw,cookie): Shows a login prompt to the user and returns the entered username and password, and the cookie received from the user’s browser (if any). b. LoginCorrect(IN: un,pw; OUT: true/false): If the provided username-password pair is valid, the function returns true; otherwise, it returns false. c. GrantAccess(IN: un,cookie): The function sends the cookie to the user’s browser and then enables access to the specified user account. d. Message(IN: text): Shows a text message. e. ATTChallenge(OUT: Pass/Fail): Challenges the user with an ATT and returns “Pass” if the answer is correct; otherwise, it returns “Fail”. f. V alidUsername(IN: un; OUT: true/false): If the provided username exists in the login system, the function returns true; otherwise, it returns false. g. V alid(IN: cookie,un,k1,state; OUT: cookie,true/false): First, the function checks the validity of the cookie (if any) where it is considered invalid in the following cases: (1) the login username does not match the cookie username; (2) the cookie is expired; or (3) the cookie counter is equal to or greater than k1. IV. ANALYSIS OF TEST CASES Table 6.4 Summary of test cases Test ID Test Name Input Actual result Expected result 1 Known User login (valid cookie) Valid username and password Successful login message displayed Successful login Message displayed 2 Known user login (expired cookie) Valid username and password Requested to answer an ATT challenge Requested to answer an ATT challenge 3 User login from unknown machine Valid username and password After exceeding known user failure attempt threshold(10) After exceeding known user failure attempt threshold ,challenged
  • 4. Improving Efficiency Of Password… www.theijes.com The IJES Page 29 ,challenged with an ATT with an ATT 4 User login from known machine after few failed attempts Valid username and password ,correct reply to ATT challenge ATT answered successfully and access granted ATT answered successfully and access granted 5 Hacker/bot login Valid Username and incorrect password 3 login attempts allowed ,later challenged with ATT 3 login attempts allowed ,later challenged with ATT All the above test cases have been tested and expected results have been observed. s napshot: login with wrong password; limit exceeded snapshot: successful login showing creation of user cookie V. CONCLUSION Online password guessing attacks on password-only systems have been observed for decades. Present- day attackers targeting such systems are empowered by having control of thousand to million node botnets. In previous ATT-based login protocols, there exists a security-usability trade-off with respect to the number of free failed login attempts (i.e., with no ATTs) versus user login convenience (e.g., less ATTs and other requirements). In contrast, PGRP is more restrictive against brute force and dictionary attacks while safely allowing a large number of free failed attempts for legitimate users. The work shows that while PGRP is apparently more effective in preventing password guessing attacks (without answering ATT challenges), it also offers more convenient login experience, e.g., fewer ATT challenges for legitimate users even if no cookies are available. However, no user-testing of PGRP has been conducted so far. PGRP appears suitable for organizations of both small and large number of user accounts. The required system resources (e.g., memory space) are linearly proportional to the number of users in a system. PGRP can also be used with remote login services where cookies are not applicable. REFERENCES [1] B. Pinkas and T. Sander. -Securing passwords against dictionary attacks in ACM conference on Computer and communications security [2] E. Bursztein, S. Bethard, J. C. Mitchell, D. Jurafsky, and C. Fabry "How good a humans at solving CAPTCHAs? " [3] P. C. van Oorschot and S. Stubblebine- On countering online dictionary attacks with login histories and humans-in-the-loop.