User Authenticate Using Multifactor Authentication
Main Article Content
Abstract
This study delves into sophisticated multi-faceted approaches. authentication techniques to enhance system security. As cyber-attacks become increasingly sophisticated, it is crucial to continuously update our systems to protect them from malicious hackers. Our study identifies that hackers often deploy multiple systems to infiltrate or compromise a target. They may obscure or alter system details, dynamically change IP addresses, or switch networks during an attack. In response, we have developed a website that captures the device ID upon any interaction. When a user tries to log in, they must provide their username and password. If these credentials are verified, the system then generates a file containing the username, device ID, and the first three digits of the password, which is encrypted using a hashing algorithm and stored in the database. Successful login is contingent upon matching the file details. In the event of a device ID mismatch, the user is prompted for a live image capture. If the captured image is verified as accurate, access is granted; otherwise, access is denied. This research employs hashing algorithms to ensure secure data transfer between endpoints, providing a robust defense against unauthorized access. This approach offers enhanced security for various sectors, including banking, insurance, and healthcare, safeguarding login credentials from cyber threats.
Article Details

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.