You are on page 1of 13

PASSWORD STRENGTH Submitted By:

PREDICTION IN AJAY KRISHNA N G

E-COMMERCE Roll No: 05-4A

Guide:
Ms. VEENA JOSE
NAME OF THE ORGANIZATION
ALLIEVO LEARNING CENTRE
PALARIVATTOM
KERALA
682025

EXTERNAL GUIDE FRONTEND - HTML, CSS, JavaScript


ROSHAN JOSE BACKEND - Python, MySQL, Django
PROJECT MANAGER
INTRODUCTION
• In the realm of cybersecurity, Predicting password strength is crucial , serving as a primary defense against
unauthorized access and safeguarding sensitive information.

• Strong passwords are fundamental for secure authentication in the face of increasing cyberattacks and data leaks.

• Password-strength prediction meters play a crucial role in helping users create more secure passwords.

• Our system aims to transform authentication methods in response to rising cybersecurity threats.

• Adaptive authentication and advanced password policies are integrated into our solution.

• Password strength prediction allows users to create robust and imperishable passwords.
EXISTING SYSTEM
• Users frequently fall into the trap of creating passwords that are easily memorable, such as using common words,
phrases, or personal information.

• The predictability of these passwords makes them vulnerable to dictionary attacks and other forms of
exploitation.

• Another prevalent issue in the existing system is the tendency for users to reuse passwords across multiple
platforms.

• This practice amplifies security risks, as a compromised password on one platform could lead to unauthorized
access on others.

• Moreover, Many users resist creating complex passwords due to concerns about forgetting them.
PROPOSED SYSTEM
• The proposed system empowers users by giving them the capability to assess and strengthen their passwords
before finalizing account credentials.

• Recognizing the pivotal role of strong passwords in countering cyber threats, the application employs advanced
algorithms.

• Users undergo comprehensive analysis of their chosen passwords, gaining insights into their effectiveness.

• This enables informed decision-making and helps users avoid vulnerabilities associated with weak or common
password choices.

• The core objective is to provide a proactive approach to password security, allowing users to scale up the strength
of their passwords based on algorithmic assessments.
MODULES
1. REGISTRATION

• Introduction – Registration for new users.

• Input – Provides username, email, password and other basic details(phone,gender etc..) of users.

• Processing – Checks whether the basic registration details provided by the user is valid or invalid and
whether the user is already registered or not and predict the password strength(weak, medium,strong)

• Output – The new user is registered successfully.


2. STRENGTH PREDICTION

➢ PREPROCESSING
• Introduction – Collecting and preprocessing password dataset

• Input – password data from various sources.

• Processing –The collected dataset is pre-processed to handle the missing outliers and inconsistencies in the dataset.

• Output – Pre-processed training and testing dataset

➢ BUILD MODEL
• Introduction – Building a machine learning model for password strength prediction

• Input – Features from pre-processed data.

• Processing – A machine learning model is created using an algorithm.

• Output – A machine learning model is made for password strength prediction


➢ TRAIN MODEL
• Introduction – Training the model using training dataset.

• Input – Pre-processed training dataset.

• Processing – The training data is fed into the machine learning model and allowing it to learn from the patterns in the data.

• Output – Trained machine learning model.

➢ Forgery Detection
• Introduction – Prediction of passwords

• Input – Input passwords

• Processing – The password inputted is fed into the model and is processed using the algorithm.

• Output – The predicted result (0-weak, 1-medium, 2-strong) is showed.


3. PRODUCT

➢ ADD PRODUCT ➢PURCHASE PRODUCT


• Introduction –The product can able to add by providing details • Introduction –The users can purchase the products .

• Input – name, image, rate, and description • Input – Product name


• Processing – Users can purchase the selected products.
• Processing – Admin can add a product using these details.
• Output – Product purchased successfully.
• Output – Product added successfully.

➢ REMOVE PRODUCT
• Introduction – admin can remove a product

• Input – Product id

• Processing – The admin removes the product using the product ID

• Output – Product removed successfully.


4. PAYMENT

• Introduction –It facilitates the secure and efficient processing of transactions for purchases

• Input – Users input payment details including credit card information and billing address

• Processing Payment gateways are employed to authorize and process transactions securely.

• Output – Payment completed successfully


CONCLUSION
In conclusion, password strength prediction stands as a pivotal element in the ongoing quest for robust
cybersecurity practices. As cyber threats continue to evolve, the imperative to fortify authentication methods
becomes increasingly apparent. Our proposed system, leveraging advanced algorithms and machine learning
techniques, not only empowers users to gauge and enhance the strength of their passwords but also fosters a
proactive approach to security. Through comprehensive analysis and insights, users are better equipped to make
informed decisions, steering clear of vulnerabilities associated with weak passwords. By positioning itself as a user-
centric solution, bridging the gap between password creation and robust cybersecurity practices, the project not only
addresses the inherent challenges of password authentication but also strives to enhance the overall resilience of
digital defense against potential cyber attacks. As we move forward, the continuous refinement and integration of
such predictive systems will play a crucial role in ensuring a secure digital landscape for users worldwide.
REFERENCES
• Komal Kumari, Pooja Yadav, and Sanjeev Kumar Sharma. "A Review on Password Strength Prediction
Techniques Using Machine Learning." In: Advances in Computing and Intelligent Systems. Springer, Singapore,
2021. pp. 243-252. DOI: 10.1007/978-981-15-6715-0_22

• Shukla, Divyeshkumar, and Vipul Tank. "Password Strength Prediction using Machine Learning Algorithms: A
Survey." International Journal of Computer Applications 183.5 (2018): 15-18. DOI: 10.5120/ijca2018917372.

• Burchert, W., and R. Stolpe. "Towards a machine learning-based password strength meter." 2015 International
Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2015. DOI:
10.1109/CyberSA.2015.7166141
THANK YOU

You might also like