International Journal of Scientific and Research Publications, Volume 6, Issue 10, October 2016 120 ISSN 2250-3153 www.ijsrp.org Secure Authentication: Defending Social Networks from Cyber Attacks Using Voice Recognition L.S.Y. Dehigaspege, U.A.A.S. Hamy, H.A.H. Shehan, S.A. Dissanayake, H.P. Dangalla, W.H.I. Wijewantha and Dhishan Dhammearatchi Sri Lanka Institute of Information Technology Computing (Pvt) Ltd Abstract- Advance development of technology internet plays an important role. When pointing out internet social networking is an essential thing to people, the usage of social networking sites is dramatically high compared to other websites. Reason behind this is people who lives in 21st century has been addicted to social networking sites to keep connection with others. Social networking sites are not only to communicate or interact with each other currently it is used as a way of business promotion. Due to tremendous growth of social networking sites it also under arrested to cyber-attacks. This issue has led even with data sharing process, this raise number of cyber issues on security and privacy through social networking sites. Since people are connected to social networking sites with their own devices they have been caught to various threats. A cyber threat can be o f various ways it can be intentional or unintentional, targeted or non-targeted it can be occurred in many ways may be from an information warfare, criminals, hackers etc. Existing systems such as antivirus systems, internet security systems are just not enough to protect the threats that occur to the social networking sites. Introducing an effective and highly advance cyber security system has become essential. This paper aims to provide a highly secured way to access social networking sites. The proposed framework is based on an algorithm which includes a voice recognition system which logs the user to their private account by tracking their voice as a login method along with that the algorithm includes a location identification system. Moreover, the concept CAPTCHA’s program to distinguish the bots from human users has been included to the proposed algorithm. The purpose of this study is to introduce a disenchanting cyber-attack defense system which involves an algorithm by including above mentioned aspects. Index Terms- Social networking, cyber-attacks, algorithm, voice recognition, location identification, CAPTCHA’s. I. INTRODUCTION nline social networking sites now have been developed rapidly all among the world it is now been used by hundreds of millions of people daily to keep contact with each other. However, through social networking sites people post their daily routines, real life connections, backgrounds etc. When it comes to social networking sites there are numerous number of sites among those some popular social networking sites which people tend to use are Facebook, Google+, Instagram, Twitter etc. Social networking sites allow space for users to add personal information such as birthday, gender, relationships, interests, education, employment history and contact information. Furthermore, online social networking sites such as Facebook allow users to access another friend’s timeline by posting on their walls, inserting images etc. These facilities are now famous among people to keep contact with each other. Even though social networking sites give users many advantages as everything it too contains a side of disadvantages. As people tend to post their personal information on social networking sites the eye of the hackers is now been followed to many social networks. They keep track of the profiles in the sites to do various criminal activities. Cyber criminals targeting on social networking sites are in many ways they are “Daniel of service” (DOS), this is an attack which makes a computer or a network unavailable to the user. DOS is being created to interrupt the users temporally or permanently which is connected to the internet. DOS can affect to social networking sites by slowing the access of the profiles, making unavailable the account, making spam messages to other friends with use of DOS. “Distributed Daniel of Service Attack” (DDOS) is an attack that can make whole online social network unavailable for users. DDOS attacks mainly broadcasted to large networks because it can spread to a large network. The attack that are spread through the networks are defined as Botnets. Once the botnet is infected the devices can be controlled remotely without the owner. Figure 1 below shows a brief idea about DOS and DDOS attack. Figure 1: DOS & DDOS Attack (Source: http://www.dillonhale.com/files/cache/74691619a94df15 a86363fd5dee1c3eb_f80.jpg) A major attack which is been running through social networking sites is the “Brute Force” attack this is a software which is developed to guess passwords of the private accounts. Brute force attacks the user in the front door which means it tries to hack the password by gaining access to error attempts. Figure O