The design and implementation of background Pass-Go scheme towards security threats

  • Authors:
  • L. Y. Por;X. T. Lim;M. T. Su;F. Kianoush

  • Affiliations:
  • Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia;Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia;Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia;Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia

  • Venue:
  • WSEAS Transactions on Information Science and Applications
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Currently, access to computer systems is often based on the use of alpha-numeric. The textual passwords or alpha-numeric passwords have been the basis of authentication systems for centuries. Similarly, it had also been the major attraction for crackers and attackers. However, users tend to face difficulty in remembering a password that is considered as secured password because this type of secured password usually has long string of characters and they appear randomly [14]. Hence, most users tend to create simple, short and insecure passwords. As a consequence, most of the time, the usability level of passwords has not achieved an optimum for a secured password [14]. In order to solve this problem, a new password scheme had been invented, known as Graphical Password System (GPS). Graphical password is an alternative mean of authentication for login intended to be used in place of conventional password; it utilizes images instead of text. In this paper, we discuss the design and intention of our proposed scheme, called Background Pass-Go (BPG). BPG is an improved version of Pass-Go, as it keeps most of the advantages of Pass-Go and achieves better usability. We had analyzed the BPG scheme in terms of 1) how BPG is able to improve other schemes of GPS especially in Pass-Go, 2) how BPG acts as a solution to different types of threats to networked computer systems. We had verified that BPG manages to overcome the shortage of other GPS schemes. Moreover, the BPG also manages to address most of the security threats for the network security system.