UGC Approved Journal no 63975

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 10 | Issue 2 | February 2023

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 4 Issue 5
May-2017
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1705063


Registration ID:
170392

Page Number

311-313

Share This Article


Jetir RMS

Title

Honeyword Encryption Mechanism in Network Security

Abstract

Banking systems always needs escalated security solutions. In tradition websites security measures are very low resulting easily hack able server systems. We are proposing a new All in One architecture that will guard our banking system from various attacks. Main security threats such as SQL injection attack, URL injection attack, cross site scripting, brute force attack. We will build a system that will prevent all these type of attacks. Every time a hacker tries to launch any of these attacks our system will generate a log into database. Hacker will be banned for a certain of time period. The honeywords concept is also elegant because any attacker who's able to steal a copy of a password database won't know if the information it contains is real or fake. "An adversary who steals a file of hashed passwords and inverts the hash function cannot tell if he has found the password or a honeyword," Jules and Rivets pointed out. "The attempted use of a honeyword for login sets off an alarm. An auxiliary server (the "honeychecker") can distinguish the user password from honeywords for the login routine and will set off an alarm if a honeyword is submitted." Our systems will have some unique features like user’s password will be stored in encrypted format as a honeyword. This honeyword is shared with admin. If hacker uses honeyword directly then system will ban access of hacker. System is complete Banking solution. User can transfer money to other accounts and perform other transactions.

Key Words

Cite This Article

"Honeyword Encryption Mechanism in Network Security ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.4, Issue 5, page no.311-313, May-2017, Available :http://www.jetir.org/papers/JETIR1705063.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Honeyword Encryption Mechanism in Network Security ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.4, Issue 5, page no. pp311-313, May-2017, Available at : http://www.jetir.org/papers/JETIR1705063.pdf

Publication Details

Published Paper ID: JETIR1705063
Registration ID: 170392
Published In: Volume 4 | Issue 5 | Year May-2017
DOI (Digital Object Identifier):
Page No: 311-313
Country: pune, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003069

Print This Page

Current Call For Paper

Jetir RMS