SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 1 (May 2013), PP. 01-05
1
Trusted Profile Identification and Validation Model
Himanshu Gupta1
, A Arokiaraj Jovith2
1, 2
Dept. of Information Technology, SRM University, Chennai, India
Abstract:- Social networking is one of the most popular Internet activities, with millions of users from
around the world. The users believe their friend’s so blindly on this virtual world as they are sitting
next to them and also users provide so much information about them which help the attackers to launch
a social engineering attacks. As attacker can duplicate the presence of the users and fool the friends of
the user to gain access to the user’s friend system. This all happens due to more than one user profile
present in these sites. Facebook announced 1 billion users in October 2012[1] and there are some sites
on the Internet which sells the Facebook[2] and other user profiles to propagate their advertisements.
All those selling profiles are cloned. The biggest problem in these sites is that they don’t have the tools
for detecting duplicate profiles. The basic concept is to identify the Duplicate profiles and validate the
genuine profiles among them as trusted profiles. To implement this we have to create authentication
model and monitoring system. The authentication model will stop the bots for creating duplicate
profiles and monitoring system will monitor the user activity and based on the results of the monitoring
system the authentication model will validate the profiles.
Keywords:- Trusted Profile, Motion Captcha, Single Sign On, Bots.
I. INTRODUCTION
The popularity of the social networking sites is so much that everyone wants to join these sites.
Facebook announced 1 billion users in October 2012[1] and also LinkedIn has 60 million users[3]. As the
majority of users only want to use these sites but they are not familiar with the privacy issues in these sites, they
often provide so much of their personal information in their profiles which is available to everyone on these
sites. Due to which an attacker may clone the profile of the user in same or different social networking sites to
launch a social engineering attack.
Trusted Profile Identification and Validation is a model which will reduce the profile cloning on a social
networking site. As in today’s Internet many social networking sites like Facebook [2], LinkedIn etc. have lots
of duplicate profiles which are used by the different unauthorised people to perform illegal tasks like:
 Attackers may duplicate a legitimate user’s online presence to launch social engineering attack.
 Attackers may create a new profile in same or different social networking site(s) with user personal
data.
 Attackers may spread false messages to create panic in the public.
 Attackers may fool the user to pay for the services which never exist.
 Attackers may use the email or user-id of the legitimate user to launch a DOS attack.
Many social networking sites do not provide any counter measure for the above mentioned points. In
order to stop these attacks the proposed system will provide. Authentication Model will try to authenticate the
user at each level and uses monitor system data to accomplish its task. Monitoring System will monitor the user
based on the user friends, posts, location etc. and provide a feed to Authentication Protocol.
The objective of this paper is to identify the Duplicate profiles and validate the genuine profiles among them as
trusted profiles. To provide this functionality the model must implement the following:
 To verify whether a user who is trying to register is a human or a bot.
 Monitor the user activity.
 Provide different authentication and verification methods.
 Use monitor activity data to validate the user.
II. DESIGN
In this section we outline the design of our model for validating the genuine profiles. This model
comprises of two components and we describe it one by one.
Trusted Profile Identification and Validation Model
2
1. Authentication Protocol
This component is responsible to mark a profile genuine or duplicate and also stop bots to create
duplicate profiles. It will validate every user at the time of their login and analyze the output of the monitoring
system to verify the profile. This model will use live or motion captcha [4] to validate a user at the time of
his/her profile registration that the user is a human or a bot. Also this model can authenticate the user from any
other government or social networking site on the basis of some govt. id or an email that person is using [5].
This model can block access to the profile on the basis of the information it collect from the monitoring system
like increase in number of post per day or number of friends. The authentication protocol is divided in 2 parts:
Fig. 1. Diagram of our system architecture
i. Authentication for Login
This part of component will authenticate and authorize the user at the time of login. Apart from the username
and password it will check the time, location or last activity to authenticate the user and any malicious activity
will intercepted it will verify the user with the combination of the personal data provided by the user itself.
ii. Authentication for Registration
This part of component will stop the bots by creating duplicate profiles. As many bots can create the duplicate
profiles by collecting online data [4] and breaking the captcha [5]. This part will use the live or motion captcha
[6] which a human can only solve. By this we can stop the bots.
2. Monitoring System:
This component of the model monitors the activity of the user and provides the information to the
authentication protocol. This component will validate the profiles on the basis of some rules like number of post
per day or location. If it detects any malicious activity then it will provide the information to the authentication
protocol. Monitoring system is divided into 3 parts:
i. User Monitoring
This part will monitor user on the basis of location or number of friends detect the duplicate profiles and it can
also detect the duplicate profiles on the basis of Detecting Social Network Profile Cloning [7]. This monitoring
will provide information to the authentication protocol to authenticate the user at the time of login.
ii. Report Abuse Monitoring
This part will help the system to track the duplicate profiles with the help of the users. As user can provide the
view about the profiles using the Report Abuse Functionality the system can prioritize the user profiles for
identification and validation. Also this part will help the Content Monitoring to maintain the list of abusive
words of sms language.
iii. Content Monitoring
Content Monitoring is an add-on to this module to monitor the content posted by the user. We can mark user on
the basis of the content he/she will post and monitor them on these basis or if some different behavior is
detected we can verify those users by Authentication protocol.
III. IMPLEMENTATION
Trusted Profile Identification and Validation Model
3
Authentication Protocol
This component is the main working part of the model which will mark the profiles as trusted or not.
This component will analyze the monitoring system information and identify the profiles. Apart from this the
component will stop the bots and verify the user at the time of their login or registration.
i. Authentication for Login
As login is the entry point so if the users profile is not set as trusted profile we have to verify users
through some methods. For this we can verify the user by these methods:
a)Enforce user to verify themselves on the basis of their personal data like we can ask user to enter
combination of their password with their secondary email. When a user will fill the registration form the
next page will be the security page in which user has to enter the personal details like email, phone number,
two security questions with answers etc. so the model have 7 distinct information about the user and
whenever model has to verify the user it can verify the user on the basis of this information i.e. model can
verify the user with 7*6 = 42 different combinations. This means that bot can never predict the answers in
this verification process and if a user account is compromised then also the hacker cannot view the security
information of the user because it is protected by the profile password.
b)Also we can use other social networking sites like facebook for authenticate user. The idea behind this is if
the government will provide centralized servers which will support a Single Sign On or Open Id concept for
each user so it is easy to authenticate the user.
Fig. 2. Google SSO
1.The web application asks the end user to log in by offering a set of log-in options, including using their
Google account.
2.The user selects the "Sign in with Google" [8] option.
3.The web application sends a "discovery" request to Google to get information on the Google login
authentication endpoint.
4.Google returns an XRDS [9] document, which contains the endpoint address.
5.The web application sends a login authentication request to the Google endpoint address.
6.This action redirects the user to a Google Federated Login page, either in the same browser window or in a
popup window, and the user is asked to sign in.
7.Once logged in, Google displays a confirmation and notifies the user that a third-party application is
requesting authentication. The page asks the user to confirm or reject linking their Google account login
with the web application login. If the web application is using OpenID+OAuth, the user is then asked to
approve access to a specified set of Google services. Both the login and user information sharing must be
approved by the user for authentication to continue. The user does not have the option of approving one but
not the other.
8.If the user approves the authentication, Google returns the user to the URL specified in
the openid.return_to parameter [8] of the original request. A Google-supplied identifier, which has no
relationship to the user's actual Google account name or password, is appended as the query
Trusted Profile Identification and Validation Model
4
parameter openid.claimed_id. If the request also included attribute exchange, additional user information
may be appended. For OpenID+OAuth, an authorized OAuth request token is also returned.
The web application uses the Google-supplied identifier to recognize the user and allow access to
application features and data. For OpenID+OAuth, the web application uses the request token to continue the
OAuth sequence and gain access to the user's Google services.
ii. Authentication for Registration
In this part our main purpose is to stop bots by creating the duplicate profiles in social networking sites.
To stop this we have to ask each user their information in random way so that bot cannot predict the registration
or we can use the Single Sign-On facility to get the user information and register user in our social networking
site. For registration we can use these methods:
a) With the random registration input use the live captcha [6] to test the user that he/she is a human. As
shown in picture below the user has to arange the numbers in the orde which a human can only solve not a bot.
Fig. 3. Motion CAPTCHA
The figure shown above will be a challenge to the user to solve the puzzle and sort the numbers using
the mouse through which we can confirm the user as a human.
b)The same idea which we use in Authentication for Login we can use that here. Single Sign-On or Open Id
concept can be used to fetch required information from the centralized server to register the user. E.g.
While a user is signed in to an app, the app can access the account's email address or OpenID [10] identifier
for every request the user makes to the app. The app can also access a user ID that identifies the user
uniquely, even if the user changes the email address for his/her account through opened.claimed_id,
opened_identity [8]etc. The app can also determine whether the current user is an administrator (a
"developer") for the app. You can use this feature to build administrative features for the app, even if you
don't authenticate other users.
IV. CONCLUSION
In this paper a methodology is proposed detect the duplicate profiles of the existing users. The model
will mark the user profiles as a trusted one on the basis of their usage and if any malicious activity is detected
the model can verify the users on the basis of their personal data. There is a monitoring system in the model
which will track the user activity on daily basis i.e. number of posts per day, language used by the user, location
of the user etc. and report to the authentication protocol. Authentication protocol will mark the user profiles as
trusted and also perform authentication at login. By this model implemented in a social networking site we can
detect and track the duplicate profiles of the existing user and stop the bots for fake registration on the social
networking site.
REFERENCES
[1]. “Facebook statistics,” Available: http://www.facebook.com/press/info.php?statistics.
[2]. “Facebook Botnets have gone Wild” Available: http://www.itworld.com/it-
managementstrategy/278005/faking-it-facebook-profile-bot-network
[3]. “LinkedIn statistics,” Available: http://techcrunch.com/2010/06/20/linkedin-tops-70-millionusers-
includes-over-one-million-company-profiles/
[4]. Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P.
Markatos, “Using Social Networks to Harvest Email Addresses”, in WPES ’10: Proceedings of the 9th
annual ACM workshop on Privacy in the electronic society.
Trusted Profile Identification and Validation Model
5
[5]. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: automated identity
theft attacks on social networks,” in WWW ’09: Proceedings of the 18th
international conference on
World wide web.
[6]. “Live CAPTCHA,” Available: http://jquerybyexample.blogspot.com/2012/04/best-5-jquery-captcha-
plugins.html
[7]. Georgios Kontaxis,Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, “Detecting Social
Network Profile Cloning” in Pervasive Computing and Communications Workshops (PERCOM
Workshops), in 2011 IEEE International Conference.
[8]. “Single Sign On,” Available: https://developers.google.com/accounts/docs/OpenID
[9]. “eXtensible Resource Descriptor Sequence, ” Available: http://en.wikipedia.org/wiki/XRDS
[10]. “OpenId,” Available: http://openid.net/

More Related Content

What's hot

Smart Password
Smart PasswordSmart Password
Smart Password
paperpublications3
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
 
Connect me 20% presentation
Connect me 20% presentationConnect me 20% presentation
Connect me 20% presentation
Usman Iqbal
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
Proguard: detecting malicious accounts in social-network-based online promotions
Proguard: detecting malicious accounts in social-network-based online promotionsProguard: detecting malicious accounts in social-network-based online promotions
Proguard: detecting malicious accounts in social-network-based online promotions
Vaishali Misra
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
Naval OPSEC
 
Facebot
FacebotFacebot
Facebot
PuN1sh3r_1
 
Two
TwoTwo
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
osuhaibany
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET Journal
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
Resham Acharya
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
Naval OPSEC
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
Naval OPSEC
 
762019109
762019109762019109
762019109
IJRAT
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Com Ed 8 Finals
Com Ed 8 FinalsCom Ed 8 Finals
Com Ed 8 Finals
bluejayjunior
 
AGPresentation
AGPresentationAGPresentation
AGPresentation
Pradip Jinjala
 

What's hot (20)

Smart Password
Smart PasswordSmart Password
Smart Password
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 
Connect me 20% presentation
Connect me 20% presentationConnect me 20% presentation
Connect me 20% presentation
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Proguard: detecting malicious accounts in social-network-based online promotions
Proguard: detecting malicious accounts in social-network-based online promotionsProguard: detecting malicious accounts in social-network-based online promotions
Proguard: detecting malicious accounts in social-network-based online promotions
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Facebot
FacebotFacebot
Facebot
 
Two
TwoTwo
Two
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
762019109
762019109762019109
762019109
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Com Ed 8 Finals
Com Ed 8 FinalsCom Ed 8 Finals
Com Ed 8 Finals
 
AGPresentation
AGPresentationAGPresentation
AGPresentation
 

Viewers also liked

Extensiones
ExtensionesExtensiones
Extensiones
Joshua Delmal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Núcleo ciclo y cromosomas
Núcleo ciclo y cromosomasNúcleo ciclo y cromosomas
Núcleo ciclo y cromosomasciencia20
 
B07010613
B07010613B07010613
B07010613
IJERD Editor
 
A POWERPOINT PRESENTATION ON RATIONAL NUMBERS
A POWERPOINT PRESENTATION ON RATIONAL NUMBERSA POWERPOINT PRESENTATION ON RATIONAL NUMBERS
A POWERPOINT PRESENTATION ON RATIONAL NUMBERS
jinisheejad
 
Uni Capabilities
Uni CapabilitiesUni Capabilities
Uni Capabilities
pcara
 
How top marketers think about storytelling: 10 Takeouts
How top marketers think about storytelling: 10 TakeoutsHow top marketers think about storytelling: 10 Takeouts
How top marketers think about storytelling: 10 Takeouts
Lemon Scented Tea
 
Makalah bulu tangkis,,,,
Makalah bulu tangkis,,,,Makalah bulu tangkis,,,,
Makalah bulu tangkis,,,,
Septian Muna Barakati
 
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
VittorioTedeschi
 
Dracs
DracsDracs
Crisis de las democracias
Crisis de las democraciasCrisis de las democracias
Crisis de las democracias
rmablogcienciassociales
 
DFS and BFS
DFS and BFSDFS and BFS
DFS and BFS
satya parsana
 

Viewers also liked (15)

Extensiones
ExtensionesExtensiones
Extensiones
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Núcleo ciclo y cromosomas
Núcleo ciclo y cromosomasNúcleo ciclo y cromosomas
Núcleo ciclo y cromosomas
 
B07010613
B07010613B07010613
B07010613
 
A POWERPOINT PRESENTATION ON RATIONAL NUMBERS
A POWERPOINT PRESENTATION ON RATIONAL NUMBERSA POWERPOINT PRESENTATION ON RATIONAL NUMBERS
A POWERPOINT PRESENTATION ON RATIONAL NUMBERS
 
Uni Capabilities
Uni CapabilitiesUni Capabilities
Uni Capabilities
 
How top marketers think about storytelling: 10 Takeouts
How top marketers think about storytelling: 10 TakeoutsHow top marketers think about storytelling: 10 Takeouts
How top marketers think about storytelling: 10 Takeouts
 
Makalah bulu tangkis,,,,
Makalah bulu tangkis,,,,Makalah bulu tangkis,,,,
Makalah bulu tangkis,,,,
 
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
Filmes para quem despreza o cinema nacional (Parte 3 - Década de 90)
 
Dracs
DracsDracs
Dracs
 
Crisis de las democracias
Crisis de las democraciasCrisis de las democracias
Crisis de las democracias
 
DFS and BFS
DFS and BFSDFS and BFS
DFS and BFS
 

Similar to A07010105

SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers
IBM Security
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
 
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
ijtsrd
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
AIRCC Publishing Corporation
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
ijcsit
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CloudIDSummit
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
joyjonna282
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Evelyn Donaldson
 
Literature survey on identity management
Literature survey on identity managementLiterature survey on identity management
Literature survey on identity management
Vaibhav Sathe
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
AyushKavariya1
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
IRJET Journal
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
IOSR Journals
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
IJCSES Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
csandit
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 

Similar to A07010105 (20)

SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Literature survey on identity management
Literature survey on identity managementLiterature survey on identity management
Literature survey on identity management
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

A07010105

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 1 Trusted Profile Identification and Validation Model Himanshu Gupta1 , A Arokiaraj Jovith2 1, 2 Dept. of Information Technology, SRM University, Chennai, India Abstract:- Social networking is one of the most popular Internet activities, with millions of users from around the world. The users believe their friend’s so blindly on this virtual world as they are sitting next to them and also users provide so much information about them which help the attackers to launch a social engineering attacks. As attacker can duplicate the presence of the users and fool the friends of the user to gain access to the user’s friend system. This all happens due to more than one user profile present in these sites. Facebook announced 1 billion users in October 2012[1] and there are some sites on the Internet which sells the Facebook[2] and other user profiles to propagate their advertisements. All those selling profiles are cloned. The biggest problem in these sites is that they don’t have the tools for detecting duplicate profiles. The basic concept is to identify the Duplicate profiles and validate the genuine profiles among them as trusted profiles. To implement this we have to create authentication model and monitoring system. The authentication model will stop the bots for creating duplicate profiles and monitoring system will monitor the user activity and based on the results of the monitoring system the authentication model will validate the profiles. Keywords:- Trusted Profile, Motion Captcha, Single Sign On, Bots. I. INTRODUCTION The popularity of the social networking sites is so much that everyone wants to join these sites. Facebook announced 1 billion users in October 2012[1] and also LinkedIn has 60 million users[3]. As the majority of users only want to use these sites but they are not familiar with the privacy issues in these sites, they often provide so much of their personal information in their profiles which is available to everyone on these sites. Due to which an attacker may clone the profile of the user in same or different social networking sites to launch a social engineering attack. Trusted Profile Identification and Validation is a model which will reduce the profile cloning on a social networking site. As in today’s Internet many social networking sites like Facebook [2], LinkedIn etc. have lots of duplicate profiles which are used by the different unauthorised people to perform illegal tasks like:  Attackers may duplicate a legitimate user’s online presence to launch social engineering attack.  Attackers may create a new profile in same or different social networking site(s) with user personal data.  Attackers may spread false messages to create panic in the public.  Attackers may fool the user to pay for the services which never exist.  Attackers may use the email or user-id of the legitimate user to launch a DOS attack. Many social networking sites do not provide any counter measure for the above mentioned points. In order to stop these attacks the proposed system will provide. Authentication Model will try to authenticate the user at each level and uses monitor system data to accomplish its task. Monitoring System will monitor the user based on the user friends, posts, location etc. and provide a feed to Authentication Protocol. The objective of this paper is to identify the Duplicate profiles and validate the genuine profiles among them as trusted profiles. To provide this functionality the model must implement the following:  To verify whether a user who is trying to register is a human or a bot.  Monitor the user activity.  Provide different authentication and verification methods.  Use monitor activity data to validate the user. II. DESIGN In this section we outline the design of our model for validating the genuine profiles. This model comprises of two components and we describe it one by one.
  • 2. Trusted Profile Identification and Validation Model 2 1. Authentication Protocol This component is responsible to mark a profile genuine or duplicate and also stop bots to create duplicate profiles. It will validate every user at the time of their login and analyze the output of the monitoring system to verify the profile. This model will use live or motion captcha [4] to validate a user at the time of his/her profile registration that the user is a human or a bot. Also this model can authenticate the user from any other government or social networking site on the basis of some govt. id or an email that person is using [5]. This model can block access to the profile on the basis of the information it collect from the monitoring system like increase in number of post per day or number of friends. The authentication protocol is divided in 2 parts: Fig. 1. Diagram of our system architecture i. Authentication for Login This part of component will authenticate and authorize the user at the time of login. Apart from the username and password it will check the time, location or last activity to authenticate the user and any malicious activity will intercepted it will verify the user with the combination of the personal data provided by the user itself. ii. Authentication for Registration This part of component will stop the bots by creating duplicate profiles. As many bots can create the duplicate profiles by collecting online data [4] and breaking the captcha [5]. This part will use the live or motion captcha [6] which a human can only solve. By this we can stop the bots. 2. Monitoring System: This component of the model monitors the activity of the user and provides the information to the authentication protocol. This component will validate the profiles on the basis of some rules like number of post per day or location. If it detects any malicious activity then it will provide the information to the authentication protocol. Monitoring system is divided into 3 parts: i. User Monitoring This part will monitor user on the basis of location or number of friends detect the duplicate profiles and it can also detect the duplicate profiles on the basis of Detecting Social Network Profile Cloning [7]. This monitoring will provide information to the authentication protocol to authenticate the user at the time of login. ii. Report Abuse Monitoring This part will help the system to track the duplicate profiles with the help of the users. As user can provide the view about the profiles using the Report Abuse Functionality the system can prioritize the user profiles for identification and validation. Also this part will help the Content Monitoring to maintain the list of abusive words of sms language. iii. Content Monitoring Content Monitoring is an add-on to this module to monitor the content posted by the user. We can mark user on the basis of the content he/she will post and monitor them on these basis or if some different behavior is detected we can verify those users by Authentication protocol. III. IMPLEMENTATION
  • 3. Trusted Profile Identification and Validation Model 3 Authentication Protocol This component is the main working part of the model which will mark the profiles as trusted or not. This component will analyze the monitoring system information and identify the profiles. Apart from this the component will stop the bots and verify the user at the time of their login or registration. i. Authentication for Login As login is the entry point so if the users profile is not set as trusted profile we have to verify users through some methods. For this we can verify the user by these methods: a)Enforce user to verify themselves on the basis of their personal data like we can ask user to enter combination of their password with their secondary email. When a user will fill the registration form the next page will be the security page in which user has to enter the personal details like email, phone number, two security questions with answers etc. so the model have 7 distinct information about the user and whenever model has to verify the user it can verify the user on the basis of this information i.e. model can verify the user with 7*6 = 42 different combinations. This means that bot can never predict the answers in this verification process and if a user account is compromised then also the hacker cannot view the security information of the user because it is protected by the profile password. b)Also we can use other social networking sites like facebook for authenticate user. The idea behind this is if the government will provide centralized servers which will support a Single Sign On or Open Id concept for each user so it is easy to authenticate the user. Fig. 2. Google SSO 1.The web application asks the end user to log in by offering a set of log-in options, including using their Google account. 2.The user selects the "Sign in with Google" [8] option. 3.The web application sends a "discovery" request to Google to get information on the Google login authentication endpoint. 4.Google returns an XRDS [9] document, which contains the endpoint address. 5.The web application sends a login authentication request to the Google endpoint address. 6.This action redirects the user to a Google Federated Login page, either in the same browser window or in a popup window, and the user is asked to sign in. 7.Once logged in, Google displays a confirmation and notifies the user that a third-party application is requesting authentication. The page asks the user to confirm or reject linking their Google account login with the web application login. If the web application is using OpenID+OAuth, the user is then asked to approve access to a specified set of Google services. Both the login and user information sharing must be approved by the user for authentication to continue. The user does not have the option of approving one but not the other. 8.If the user approves the authentication, Google returns the user to the URL specified in the openid.return_to parameter [8] of the original request. A Google-supplied identifier, which has no relationship to the user's actual Google account name or password, is appended as the query
  • 4. Trusted Profile Identification and Validation Model 4 parameter openid.claimed_id. If the request also included attribute exchange, additional user information may be appended. For OpenID+OAuth, an authorized OAuth request token is also returned. The web application uses the Google-supplied identifier to recognize the user and allow access to application features and data. For OpenID+OAuth, the web application uses the request token to continue the OAuth sequence and gain access to the user's Google services. ii. Authentication for Registration In this part our main purpose is to stop bots by creating the duplicate profiles in social networking sites. To stop this we have to ask each user their information in random way so that bot cannot predict the registration or we can use the Single Sign-On facility to get the user information and register user in our social networking site. For registration we can use these methods: a) With the random registration input use the live captcha [6] to test the user that he/she is a human. As shown in picture below the user has to arange the numbers in the orde which a human can only solve not a bot. Fig. 3. Motion CAPTCHA The figure shown above will be a challenge to the user to solve the puzzle and sort the numbers using the mouse through which we can confirm the user as a human. b)The same idea which we use in Authentication for Login we can use that here. Single Sign-On or Open Id concept can be used to fetch required information from the centralized server to register the user. E.g. While a user is signed in to an app, the app can access the account's email address or OpenID [10] identifier for every request the user makes to the app. The app can also access a user ID that identifies the user uniquely, even if the user changes the email address for his/her account through opened.claimed_id, opened_identity [8]etc. The app can also determine whether the current user is an administrator (a "developer") for the app. You can use this feature to build administrative features for the app, even if you don't authenticate other users. IV. CONCLUSION In this paper a methodology is proposed detect the duplicate profiles of the existing users. The model will mark the user profiles as a trusted one on the basis of their usage and if any malicious activity is detected the model can verify the users on the basis of their personal data. There is a monitoring system in the model which will track the user activity on daily basis i.e. number of posts per day, language used by the user, location of the user etc. and report to the authentication protocol. Authentication protocol will mark the user profiles as trusted and also perform authentication at login. By this model implemented in a social networking site we can detect and track the duplicate profiles of the existing user and stop the bots for fake registration on the social networking site. REFERENCES [1]. “Facebook statistics,” Available: http://www.facebook.com/press/info.php?statistics. [2]. “Facebook Botnets have gone Wild” Available: http://www.itworld.com/it- managementstrategy/278005/faking-it-facebook-profile-bot-network [3]. “LinkedIn statistics,” Available: http://techcrunch.com/2010/06/20/linkedin-tops-70-millionusers- includes-over-one-million-company-profiles/ [4]. Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos, “Using Social Networks to Harvest Email Addresses”, in WPES ’10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society.
  • 5. Trusted Profile Identification and Validation Model 5 [5]. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks,” in WWW ’09: Proceedings of the 18th international conference on World wide web. [6]. “Live CAPTCHA,” Available: http://jquerybyexample.blogspot.com/2012/04/best-5-jquery-captcha- plugins.html [7]. Georgios Kontaxis,Iasonas Polakis, Sotiris Ioannidis and Evangelos P. Markatos, “Detecting Social Network Profile Cloning” in Pervasive Computing and Communications Workshops (PERCOM Workshops), in 2011 IEEE International Conference. [8]. “Single Sign On,” Available: https://developers.google.com/accounts/docs/OpenID [9]. “eXtensible Resource Descriptor Sequence, ” Available: http://en.wikipedia.org/wiki/XRDS [10]. “OpenId,” Available: http://openid.net/