ChoCD : Usable and secure graphical password authentication scheme

The problem of spam messages is quite worrying especially for mobile users because statistics show increasing issues albeit many efforts have been introduced to reduce the risk of spam. Spammers chose SMS as their main target for spamming because SMS is considered as an important communication among...

Full description

Saved in:
Bibliographic Details
Main Author: Radhi Rafiee Bin Afandi
Format: Thesis
Language:English
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/d30e80b6-0c45-4dc0-bd71-e3ccb57668ad/download
https://oarep.usim.edu.my/bitstreams/c43e6aa4-0cc0-40eb-b70a-26ff580a46dc/download
https://oarep.usim.edu.my/bitstreams/db0b5d3a-f0c2-436f-8507-c2bc98e8ad03/download
https://oarep.usim.edu.my/bitstreams/457564ca-0a16-434e-8b25-07bc51abba58/download
https://oarep.usim.edu.my/bitstreams/bf38a32a-64a8-4d01-afb2-df5c1db2c1a0/download
https://oarep.usim.edu.my/bitstreams/694ffb1f-ff41-4141-a36f-4145d95e0a22/download
https://oarep.usim.edu.my/bitstreams/395ad989-2a2e-4ab8-b328-bd12cbc8397b/download
https://oarep.usim.edu.my/bitstreams/1da13414-9c7a-436c-8b0a-a055a04495ff/download
https://oarep.usim.edu.my/bitstreams/9fb42c4b-fad1-4eb9-94b4-0d99f54be103/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12411
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language English
topic User authentication security User authentication security
Graphical password
Password
User authentication security
spellingShingle User authentication security User authentication security
Graphical password
Password
User authentication security
Radhi Rafiee Bin Afandi
ChoCD : Usable and secure graphical password authentication scheme
description The problem of spam messages is quite worrying especially for mobile users because statistics show increasing issues albeit many efforts have been introduced to reduce the risk of spam. Spammers chose SMS as their main target for spamming because SMS is considered as an important communication among them. Problems such as inefficient algorithm, users awareness and high risk of spam are still dominating and challenging. Besides, the varieties of SMS spam sending by spammers giving us a question on the types of messages that are mostly sent by them. Having stated the aforementioned challenges, this research focuses on the second phase which is the classification (or known as clustering). The main objectives of this research are to study the relationship between Artificial Immune System (AIS) and Biology Immune System (BIS) related to spam detection, classification and severity determination, to propose an enhance method for clustering spam messages using the combination of Clonal Selection and Immune Network Theory and lastly to conduct and evaluate the proposed algorithms. A spam management model inspired from the ideology of BIS named Integrated Mobile Spam Model (IMSM) is introduced. This model consists of three phases which are detection, classification and severity determination, and each phase uses only AIS algorithms inspired from BIS. BIS has the capability to protect and defend the body from bacteria or virus that attacks us, so this theory can be applied to the mobile phone to protect from spam messages as well. Classification is the process to cluster spam messages into several groups. By doing this phase, it helps us to identify which group of spam messages that has higher occurrence and is always sent by spammers besides can help in the severity determination phase to determine the level of danger for spam messages. A new algorithm named "Hybrid Immune Clonal Network Algorithm" (HICNA) is proposed for clustering spam messages and this algorithm is a combination of Clonal Selection and Immune Network Theory. Three phases involved in this algorithm; phase one is scanning the spam messages using common keywords while phase two is using uncommon keywords. Expert judgement is needed for the last phase to ensure all spam messages are clustered into identified groups. A number of experiments have been conducted to test the performance and validity of the algorithm using different source of datasets and also to identify its usability in the detection process. The research results show that three defined objectives were fulfilled and the proposed algorithm gives better results in clustering spam messages into several groups. In addition, it shows the capability of AIS algorithm for the clustering process.
format Thesis
author Radhi Rafiee Bin Afandi
author_facet Radhi Rafiee Bin Afandi
author_sort Radhi Rafiee Bin Afandi
title ChoCD : Usable and secure graphical password authentication scheme
title_short ChoCD : Usable and secure graphical password authentication scheme
title_full ChoCD : Usable and secure graphical password authentication scheme
title_fullStr ChoCD : Usable and secure graphical password authentication scheme
title_full_unstemmed ChoCD : Usable and secure graphical password authentication scheme
title_sort chocd : usable and secure graphical password authentication scheme
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/d30e80b6-0c45-4dc0-bd71-e3ccb57668ad/download
https://oarep.usim.edu.my/bitstreams/c43e6aa4-0cc0-40eb-b70a-26ff580a46dc/download
https://oarep.usim.edu.my/bitstreams/db0b5d3a-f0c2-436f-8507-c2bc98e8ad03/download
https://oarep.usim.edu.my/bitstreams/457564ca-0a16-434e-8b25-07bc51abba58/download
https://oarep.usim.edu.my/bitstreams/bf38a32a-64a8-4d01-afb2-df5c1db2c1a0/download
https://oarep.usim.edu.my/bitstreams/694ffb1f-ff41-4141-a36f-4145d95e0a22/download
https://oarep.usim.edu.my/bitstreams/395ad989-2a2e-4ab8-b328-bd12cbc8397b/download
https://oarep.usim.edu.my/bitstreams/1da13414-9c7a-436c-8b0a-a055a04495ff/download
https://oarep.usim.edu.my/bitstreams/9fb42c4b-fad1-4eb9-94b4-0d99f54be103/download
_version_ 1812444637547200512
spelling my-usim-ddms-124112024-05-29T18:11:05Z ChoCD : Usable and secure graphical password authentication scheme Radhi Rafiee Bin Afandi The problem of spam messages is quite worrying especially for mobile users because statistics show increasing issues albeit many efforts have been introduced to reduce the risk of spam. Spammers chose SMS as their main target for spamming because SMS is considered as an important communication among them. Problems such as inefficient algorithm, users awareness and high risk of spam are still dominating and challenging. Besides, the varieties of SMS spam sending by spammers giving us a question on the types of messages that are mostly sent by them. Having stated the aforementioned challenges, this research focuses on the second phase which is the classification (or known as clustering). The main objectives of this research are to study the relationship between Artificial Immune System (AIS) and Biology Immune System (BIS) related to spam detection, classification and severity determination, to propose an enhance method for clustering spam messages using the combination of Clonal Selection and Immune Network Theory and lastly to conduct and evaluate the proposed algorithms. A spam management model inspired from the ideology of BIS named Integrated Mobile Spam Model (IMSM) is introduced. This model consists of three phases which are detection, classification and severity determination, and each phase uses only AIS algorithms inspired from BIS. BIS has the capability to protect and defend the body from bacteria or virus that attacks us, so this theory can be applied to the mobile phone to protect from spam messages as well. Classification is the process to cluster spam messages into several groups. By doing this phase, it helps us to identify which group of spam messages that has higher occurrence and is always sent by spammers besides can help in the severity determination phase to determine the level of danger for spam messages. A new algorithm named "Hybrid Immune Clonal Network Algorithm" (HICNA) is proposed for clustering spam messages and this algorithm is a combination of Clonal Selection and Immune Network Theory. Three phases involved in this algorithm; phase one is scanning the spam messages using common keywords while phase two is using uncommon keywords. Expert judgement is needed for the last phase to ensure all spam messages are clustered into identified groups. A number of experiments have been conducted to test the performance and validity of the algorithm using different source of datasets and also to identify its usability in the detection process. The research results show that three defined objectives were fulfilled and the proposed algorithm gives better results in clustering spam messages into several groups. In addition, it shows the capability of AIS algorithm for the clustering process. Universiti Sains Islam Malaysia 2016-12 Thesis en https://oarep.usim.edu.my/handle/123456789/12411 https://oarep.usim.edu.my/bitstreams/b77ad7f1-5810-4ac0-999b-51e028d99370/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/d30e80b6-0c45-4dc0-bd71-e3ccb57668ad/download 67a632a9318a13a8a8a8db792bc053f0 https://oarep.usim.edu.my/bitstreams/c43e6aa4-0cc0-40eb-b70a-26ff580a46dc/download 17a0c2c3ff869d418eff0cf0d0b75e91 https://oarep.usim.edu.my/bitstreams/db0b5d3a-f0c2-436f-8507-c2bc98e8ad03/download 9d809eda267766aca26d3ade891a2f40 https://oarep.usim.edu.my/bitstreams/457564ca-0a16-434e-8b25-07bc51abba58/download 95e2d42b029e87c7788158ebba185c14 https://oarep.usim.edu.my/bitstreams/bf38a32a-64a8-4d01-afb2-df5c1db2c1a0/download bd8ce57b14cc77746116584037b5f6c5 https://oarep.usim.edu.my/bitstreams/694ffb1f-ff41-4141-a36f-4145d95e0a22/download 817833d18ea6fba56c55df459fddee7c https://oarep.usim.edu.my/bitstreams/395ad989-2a2e-4ab8-b328-bd12cbc8397b/download 5fb65c89a2304dc227cd6673af39b123 https://oarep.usim.edu.my/bitstreams/1da13414-9c7a-436c-8b0a-a055a04495ff/download 1783f138643f2d15579395e61d733803 https://oarep.usim.edu.my/bitstreams/9fb42c4b-fad1-4eb9-94b4-0d99f54be103/download 08a913e6fc2c164a21b042adb5747b1e https://oarep.usim.edu.my/bitstreams/d48b8178-b039-474d-ae07-e708d1d16520/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/1820f4b5-17e4-44cd-b3d3-80ba4a5aa0d5/download 06b7e51e8fc077b8c75076712e4dd2b3 https://oarep.usim.edu.my/bitstreams/49bb3fce-53a9-409f-896f-6d00e72a49b0/download 6d93d3216dc4a7f5df47d4876fbec4d3 https://oarep.usim.edu.my/bitstreams/fe1c8632-75a0-40bf-85aa-e298aaaebfc0/download 1b70f87af6fdb6f73d267b35669fa6d4 https://oarep.usim.edu.my/bitstreams/ed9b33c0-4339-448c-9c72-968b74651f03/download 2c6eb67c8897d916ae47524b1a844d3f https://oarep.usim.edu.my/bitstreams/bca5dfa4-fcd9-4e73-a1a2-1381610e63c4/download 33f4f15a16a9843faf6a25d4f387b6fd https://oarep.usim.edu.my/bitstreams/722212b6-62b2-4f7e-b382-abc3828e34a8/download 1bb607118047afc5c385b82385dd931f https://oarep.usim.edu.my/bitstreams/f5d5872b-9628-4bd6-ac90-d05c11fece3e/download ff4c8ff01d544500ea4bfea43e6108c1 https://oarep.usim.edu.my/bitstreams/7d88292d-56c5-4ed8-966b-5f90d3d9716c/download 7f5b903a193cc66524e06d8c0458e34a User authentication security User authentication security Graphical password Password User authentication security