Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

Identifying Content for Planned Events Across Social Media Sites.

Platform : DATA MINING

IEEE Projects Years : 2012

Identifying Content for Planned Events Across Social Media Sites.

 

ABSTRACT

 

 

 

       Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. There for, this project work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.

 

 

 

 

 

 


EXISTING SYSTEM:

 

 

 

          Existing approaches to Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. Despite the vulnerabilities, it’s the user natural tendency of the users that they will always prefer to go for short passwords for ease of remembrance and also lack of awareness about how attackers tend to attacks. Unfortunately, these passwords are broken mercilessly by intruders by several simple means such as masquerading, Eaves dropping and other rude means say dictionary attacks, shoulder surfing attacks, social engineering attacks.

 

 

 

Disadvantage:

 

  1. The strong system-assigned passwords are difficult for users to remember.

 

 

 

PROPOSED SYSTEM:

 

          We propose is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. The proposed system work merges persuasive cued click points and password guessing resistant protocol.

 

 

 

Advantage:

 

  1. Human brain is good in remembering picture than textual character.

 

 

 

 

 

 


MODULES

 

  1. Pass Points Module.
  2. Cued Click Points Module.
  3. Persuasive Cued Click- Points Module.

 

 

 

Pass Points Module:

 

 

 

            Based on Blonder’s original idea, Pass Points (PP) is a click-based graphical password system where a password consists of an ordered sequence of five click-points on a pixel-based image. To log in, a user must click within some system-defined tolerance region for each click-point. The image acts as a cue to help users remember their password click-points.

 

 

 

Cued Click Points Module:

 

 

 

Cued Click Points (CCP) was developed as an alternative click based graphical password scheme where users select one point per image for five images. The interface displays only one image at a time; the image is replaced by the next image as soon as a user selects a click point. The system determines the next image to display based on the user’s click-point on the current image. The next image displayed to users is based on a deterministic function of the point which is currently selected. It now presents a one to-one cued recall scenario where each image triggers the user’s memory of the one click-point on that image. Secondly, if a user enters an incorrect click-point during login, the next image displayed will also be incorrect. Legitimate users who see an unrecognized image know that they made an error with their previous click-point. Conversely, this implicit feedback is not helpful to an attacker who does not know the expected sequence of images.

 

 

 

Persuasive Cued Click- Points Module:

 

 

 

          To address the issue of hotspots, Persuasive Cued Click Points (PCCP) was proposed. As with CCP, a password consists of five click points, one on each of five images. During password creation, most of the image is dimmed except for a small view port area that is randomly positioned on the image. Users must select a click-point within the view port. If they are unable or unwilling to select a point in the current view port, they may press the Shuffle button to randomly reposition the view port. The view port guides users to select more random passwords that are less likely to include hotspots. A user who is determined to reach a certain click-point may still shuffle until the view port moves to the specific location, but this is a time consuming and more tedious process.

 

 

 

SYSTEM SPECIFICATION

 

 

 

Hardware Requirements:

 

 

 

  • System             :   Pentium IV 2.4 GHz.
  • Hard Disk        :   40 GB.
  • Floppy Drive    :   1.44 Mb.
  • Monitor            :   14’ Colour Monitor.
  • Mouse              :   Optical Mouse.
  • Ram                 :   512 Mb.
  • Keyboard         :   101 Keyboard.

 

 

 

Software Requirements:

 

 

 

  • Operating system          :   Windows XP.
  • Coding Language          :   ASP.Net with C#
  • Data Base                    :   SQL Server 2005.

 

 



NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1