analysis of user behaviour tracking detecting and elimination of thief

AUVULA MOHAN,CIRIVELLA SIVA SAI,RAVELLA NARASIMHA RAO,C.LOKASAI REDDY

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 26 April,2023         Pages:1802-1808

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Social networks Accounts are tracked & detected. If hacker attacks the Genuine user then our allows the attacker to proceed further until our system captures all the important information about the attacker. We generate Honeywords based on the user info provided and the original password is converted into another format and stored along with the Honeywords. We deploy Intermediate server, Shopping server for purchase and Cloud server for maintaining user account details. Attacker who knows the E mail account of original user can easily reset the password of the cloud server. Attacker is invited to do attack in this Project, so as to find him out very easily. Now attacker logins into the purchase portal, where he is been tracked unknowingly & he is allowed to do purchase. Server identifies the attacker and sends the info to the Original owner and also it blocks the attacker even doing transaction from his original account. Keywords – Honeywords, Cloud Server

Kewords

Keywords – Honeywords, Cloud Server

Reference

[1] D. Mirante and C. Justin, “Understanding password database compromises,”Dept. of Comput. Sci. Eng. Polytechnic Inst. of NYU, NewYork, NY, USA: Tech. Rep. TR-CSE2013-02, 2013. [2] A. Vance, “If your password is 123456, just make it hackme,” NewYork Times, Jan. 2010. [3] K. Brown, “The dangers of weak hashes,” SANS InstituteInfoSec Reading Room, Maryland US, pp. 1–22, Nov. 2013,[Online].Available: http://www.sans.org/readingroom/whitepapers/authentication/dangersweak-hashes-34412. [4] M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, “Passwordcracking using probabilistic context-free grammars,” in Proc. 30thIEEE Symp. Security Privacy, 2009, pp. 391–405. [5] F. Cohen, “The use of deception techniques: Honeypots anddecoys,” Handbook Inform. Security, vol. 3, pp. 646– 655, 2006. [6] M. H. Almeshekah, E. H. Spafford, and M. J. Atallah, “Improvingsecurity using deception,” Center for Education and ResearchInformation Assurance and Security, Purdue Univ., WestLafayette, IN, USA: Tech. Rep. CERIAS Tech. Rep. 2013- 13, 2013. [7] C. Herley and D. Florencio, “Protecting financial institutions frombrute-force attacks,” in Proc. 23rd Int. Inform. Security Conf., 2008,pp. 681–685. [8] H. Bojinov, E. Bursztein, X. Boyen, and D. Boneh, “Kamouflage:Loss-resistant password management,” in Proc. 15th Eur. Conf.Res. Comput. Security, 2010, pp. 286– 302