AI and ML-Powered CAPTCHA and advanced graphical passwords: Integrating the DROP methodology, AES encryption and neural network-based authentication for enhanced security
1 John Tesla Inc, California, Sacramento, CA.
2 Hitachi Vantara,Santa Clara, California, USA.
Research Article
World Journal of Advanced Engineering Technology and Sciences, 2020, 01(01), 121-132.
Article DOI: 10.30574/wjaets.2020.1.1.0027
Publication history:
Received on 01 September 2020; revised on 11 November 2020; accepted on 14 December 2020
Abstract:
Background Information: Advanced automated attacks and unauthorized access are frequently not prevented by traditional CAPTCHA and password procedures. Combining encryption, graphical passwords, AI, and ML provides a strong solution to today's cybersecurity issues, improving security and usability.
Objective: To create a thorough multi-layered authentication system that efficiently combats advanced cyberthreats by integrating AI-powered CAPTCHA, graphical passwords using the DROP approach, AES encryption, and neural network-based authentication.
Methods: The solution incorporates neural networks for behavioral analysis and real-time threat detection, graphical passwords based on DROP for dynamic engagement, AES encryption for safe data transport, and AI-driven CAPTCHA for human verification.
Results: The suggested approach outperforms conventional techniques in terms of speed, accuracy, and resistance to automated and brute-force attacks, achieving 96.8% accuracy, a false positive rate of 0.01%, and a security level of 9.5.
Conclusion The multi-layered strategy greatly improves authentication security, effectively thwarting sophisticated cyberthreats while maintaining a flawless user experience, which qualifies it for high-security settings.
Conclusion The multi-layered strategy greatly improves authentication security, effectively thwarting sophisticated cyberthreats while maintaining a flawless user experience, which qualifies it for high-security settings.
Keywords:
AI; ML; CAPTCHA; Graphical Passwords; DROP; AES Encryption; Neural Network; Security; Authentication; Cybersecurity
Full text article in PDF:
Copyright information:
Copyright © 2020 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0