Search
Close this search box.

Authors: Sodiya, A. S.; Folorunso, O.; Komolafe, P. B.; Ogunderu, O. P.
Journal of Information Privacy & Security;2011, Vol. 7 Issue 2, pg.3

Abstract
In this work a countermeasure scheme known as the “Fool the Keylogger Model (FKM)” was developed for preventing keylogging attacks on Password Authentication Systems. In the FKM, an algorithm called

Secured Keystroke Authenticated Password Against Keylogger (SKAPAK algorithm) was developed for dissuading attackers. The model divides the process of user authentication into 3 domains; the User, the Fooled. and the Authentication Domain. The User Domain provides environment for formulation of counterfeit-password. The counterfeit-password is a product of mixture of password characters and random alphanumeric characters or noise characters. This counterfeit-password is then used by the user a non-normal authentication data to login. The Fooled Domain creates an interface for the implementation of SKAPAK algorithm. The algorithm intelligently extracts password token from the counterfeit-password after which it has scaled beyond the visibility scope of the Keylogger. The algorithm then makes a valid authentication request using the normal authentication request data. The final verification and acknowledgement of user’s credentials takes place in the Authentication Domain. The results of data analyzed for this research showed over 99.5% concealment of password from Keylogger and over 95% usability and acceptability of the model The result revealed a complete elimination of shoulder surfing threats, which simply means spying a user login session and showed that the proposed scheme provides adequate protection against keylogging attack.

 

Download PDF

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds