Implementation of a Secured Authentication System using a Policy Generator with Email Notifications
Nikhil Chakravarthy Mallela1, Arun Krishna Chitturi2, Swarnalatha Purushotham3
1Nikhil Chakravarthy Mallela, M.Tech, Department of Integrated Software Engineering, Vellore Institute of Technology, Vellore (Tamil Nadu), India.
2Arun Krishna Chitturi, M.Tech, Department of Integrated Software Engineering, Vellore Institute of Technology, Vellore (Tamil Nadu), India.
3Swarnalatha Purushotham, Department of Computer Science, Vellore Institute of Technology, Vellore (Tamil Nadu), India.
Manuscript received on 14 December 2019 | Revised Manuscript received on 22 December 2019 | Manuscript Published on 31 December 2019 | PP: 181-186 | Volume-9 Issue-1S3 December 2019 | Retrieval Number: A10361291S319/19©BEIESP | DOI: 10.35940/ijeat.A1036.1291S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: For securing the login, passwords of users from intruders and hackers, the website owners and administrators are providing certain guidelines to the users to create secure and strong passwords using a mechanism called Password Checkers. These guidelines which are provided helps the users to create strong passwords, these guidelines are also becoming the raw input for the hackers as they clearly show based on which policy the password was generated which increases the risk for brute force attacking with more ease. There by increasing the success rate probability for the brute force attackers. To overcome and to decrease the success probability for brute force attacking the Dynamic Password Policy Generator is being devised. The profiles of users are built and maintained by the system automatically bases on the interaction with the monitored database in training phase. This DBSAFE system will help both the administrator as well as the users to feel secured in terms with their data security. Also whenever, an unsuccessful attempts leaving a notification through an email will always add a extra layer of security to the system. When the system’s critical files were all under watch and someone try to access those, concerned people will be intimated to verify the system security keeping the system and database safe and healthy.
Keywords: Randomized Structure Generation, User Favored Password, Password Monitor, Passwords Anomalies.
Scope of the Article: Authentication, Authorization, Accounting